jungjin0003 / ProcessStealth
☆21Updated 3 years ago
Alternatives and similar repositories for ProcessStealth:
Users that are interested in ProcessStealth are comparing it to the libraries listed below
- Hides processes from the windows task manager using IAT hooking.☆19Updated 4 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆18Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆17Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Dump mapped PE files from memory to the disk☆19Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- EDR PoC WIP LLC☆11Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆16Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆59Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆33Updated last year
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- manual mapping injector☆27Updated 3 years ago