jdu2600 / Get-InjectedThreadEx
Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2
☆29Updated last year
Alternatives and similar repositories for Get-InjectedThreadEx:
Users that are interested in Get-InjectedThreadEx are comparing it to the libraries listed below
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆72Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆24Updated 8 months ago
- ☆80Updated 5 months ago
- ☆68Updated 6 months ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Repo containing my public talks☆23Updated last year
- A python polymorphic engine for C programs☆12Updated last year
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- Nim process hollowing loader☆55Updated 6 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆41Updated 7 months ago
- ☆22Updated last year
- ☆45Updated last year
- Python module for running BOFs☆68Updated last year
- ☆94Updated last month
- Self Delete DLL☆23Updated last year
- A simple example on how to initiate a direct syscall on WoW64☆11Updated 7 years ago
- a tiny program to consume from ETW providers for research☆46Updated last month
- Next gen process injection technique☆44Updated 4 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago