joren485 / HollowProcess
Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python
☆53Updated 3 years ago
Alternatives and similar repositories for HollowProcess:
Users that are interested in HollowProcess are comparing it to the libraries listed below
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- Process reimaging proof of concept code☆96Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Updated 5 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆120Updated 5 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 5 months ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆95Updated 7 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- few months old but better than nothing☆58Updated 3 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 3 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆91Updated 6 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 4 years ago
- ☆20Updated 10 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- ☆36Updated 3 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Some simple process injection techniques targeting the Windows platform☆32Updated 5 years ago
- Small tool to get a SYSTEM shell☆127Updated 9 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 7 years ago
- ☆70Updated 3 months ago
- Sysmon shenanigans☆65Updated 4 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆121Updated 3 years ago