jdu2600 / Get-InjectedThreadExLinks
Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2
☆51Updated 2 years ago
Alternatives and similar repositories for Get-InjectedThreadEx
Users that are interested in Get-InjectedThreadEx are comparing it to the libraries listed below
Sorting:
- ☆78Updated 3 years ago
- ☆124Updated 4 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- ☆83Updated last year
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Small tool to play with IOCs caused by Imageload events☆44Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆80Updated 2 years ago
- Python module for running BOFs☆79Updated 2 months ago
- Deleting Shadow Copies In Pure C++☆118Updated 3 years ago
- ☆28Updated 3 years ago
- Tool for playing with Windows Access Token manipulation.☆83Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆160Updated 4 years ago
- ☆137Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Updated 6 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Updated 3 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- ☆120Updated 3 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆197Updated 3 years ago
- It's pointy and it hurts!☆126Updated 3 years ago
- ☆138Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- Malware?☆76Updated 3 months ago
- Nim process hollowing loader☆62Updated 6 months ago
- ☆79Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Updated 3 years ago
- macOS dylib stager☆36Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆138Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago