jdu2600 / Get-InjectedThreadEx
Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2
☆36Updated last year
Alternatives and similar repositories for Get-InjectedThreadEx:
Users that are interested in Get-InjectedThreadEx are comparing it to the libraries listed below
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- ☆82Updated 6 months ago
- ☆72Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆59Updated last year
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- ☆71Updated 7 months ago
- List the ETW provider(s) in the registration table of a process.☆57Updated last year
- Python module for running BOFs☆70Updated last year
- quASAR: ASAR manipulation made easy☆31Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- ☆45Updated last year
- A python polymorphic engine for C programs☆12Updated last year
- ☆112Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 2 years ago
- ☆29Updated 3 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 8 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆25Updated 3 months ago
- Repo containing my public talks☆23Updated last year
- ☆96Updated 2 months ago
- a tiny program to consume from ETW providers for research☆46Updated 2 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year