joren485 / HollowProcess
Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python
☆53Updated 3 years ago
Alternatives and similar repositories for HollowProcess:
Users that are interested in HollowProcess are comparing it to the libraries listed below
- Process reimaging proof of concept code☆96Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Updated 5 years ago
- a program to detect reflective dll injection on a live machine☆75Updated 9 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Use NT Native Registry API to create a registry that normal user can not query.☆91Updated 7 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆96Updated 5 years ago
- medium-rare☆28Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 2 years ago
- ☆20Updated 10 years ago
- Simple 32/64-bit PEs loader.☆137Updated 6 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆117Updated 7 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆95Updated 7 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆91Updated 5 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 7 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆119Updated 5 years ago
- ☆36Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 4 months ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆121Updated 3 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- External C2 Using IE COM Objects☆99Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago