A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original entrypoint.
☆97Sep 26, 2019Updated 6 years ago
Alternatives and similar repositories for TRunPE
Users that are interested in TRunPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Sep 16, 2020Updated 5 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆534Jul 2, 2025Updated 10 months ago
- ☆23May 28, 2021Updated 4 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Exploring in-memory execution of .NET☆138Apr 20, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- It stinks☆103Apr 22, 2022Updated 4 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆168May 27, 2021Updated 4 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆314Oct 18, 2018Updated 7 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆141Sep 12, 2022Updated 3 years ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆250Aug 13, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PoC MSVC COFF Object file loader/injector.☆187Mar 19, 2021Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆43Sep 3, 2020Updated 5 years ago
- ☆82Feb 12, 2022Updated 4 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆201Jan 13, 2022Updated 4 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆488Jul 12, 2023Updated 2 years ago
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆828Aug 23, 2021Updated 4 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆566Apr 8, 2025Updated last year
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆144May 10, 2022Updated 3 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆268Nov 18, 2022Updated 3 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PE loader with various shellcode injection techniques☆450Oct 17, 2022Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 6 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆220Jul 14, 2021Updated 4 years ago
- C++ WinRM API via Reflective DLL☆145Sep 11, 2021Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago