itaymigdal / PichichiH0ll0werLinks
Nim process hollowing loader
☆60Updated 3 months ago
Alternatives and similar repositories for PichichiH0ll0wer
Users that are interested in PichichiH0ll0wer are comparing it to the libraries listed below
Sorting:
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- Do some DLL SideLoading magic☆89Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆68Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆123Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆94Updated last year
- ☆137Updated 2 years ago
- "Service-less" driver loading☆162Updated 11 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆121Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆73Updated 3 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆48Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- A process injection technique using only thread context manipulation☆39Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Unhook Ntdll.dll, Go & C++.☆30Updated 6 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- EvtPsst☆55Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆30Updated 6 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆48Updated 3 months ago
- ☆159Updated 10 months ago
- ☆37Updated 7 months ago
- Malware?☆74Updated last year
- ☆108Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year