itaymigdal / PichichiH0ll0werLinks
Nim process hollowing loader
☆57Updated 10 months ago
Alternatives and similar repositories for PichichiH0ll0wer
Users that are interested in PichichiH0ll0wer are comparing it to the libraries listed below
Sorting:
- A process injection technique using only thread context manipulation☆38Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- ☆100Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- ☆48Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆25Updated 2 months ago
- Malware?☆70Updated 8 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆118Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- Python module for running BOFs☆70Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 5 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- ☆75Updated 10 months ago
- ☆136Updated 2 years ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆93Updated 8 months ago
- ☆110Updated 5 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 11 months ago