itaymigdal / PichichiH0ll0werLinks
Nim process hollowing loader
☆62Updated 6 months ago
Alternatives and similar repositories for PichichiH0ll0wer
Users that are interested in PichichiH0ll0wer are comparing it to the libraries listed below
Sorting:
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Updated 6 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆127Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 10 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- A process injection technique using only thread context manipulation☆40Updated 2 years ago
- Your syscall factory☆126Updated 2 weeks ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- ☆137Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Tool for playing with Windows Access Token manipulation.☆83Updated 3 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- A bunch of scripts and code i wrote.☆148Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- ☆79Updated last year
- ☆108Updated last year
- "Service-less" driver loading☆166Updated last year
- ☆122Updated 2 years ago
- Rewrite to fit my needs☆32Updated last year
- ☆207Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆101Updated 9 months ago
- ☆124Updated 4 years ago