k4yt3x / InstantSuspendLinks
Instantly suspend processes to bypass kernel driver protections.
☆20Updated last year
Alternatives and similar repositories for InstantSuspend
Users that are interested in InstantSuspend are comparing it to the libraries listed below
Sorting:
- LLVM based obfuscation engine☆109Updated 7 months ago
- ☆73Updated 6 months ago
- ANY.RUN sandbox detection collection☆23Updated last year
- Rust bindings for VMProtect.☆27Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated last month
- ☆12Updated 3 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆48Updated 3 months ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Updated 3 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 9 months ago
- ☆60Updated 3 months ago
- merge rust-lang's llvm and KomiMoe's Arkari (llvm) to produce obfuscated llvm for rustc☆39Updated last month
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆92Updated 7 months ago
- A cross-platform C++ framework for building Windows shellcode☆81Updated this week
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- ☆39Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆52Updated 3 years ago
- Rust implementation of lazy_importer☆59Updated 2 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 8 months ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆74Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- vm_str.hpp is a header only string obfuscator.☆103Updated 5 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆138Updated 3 months ago
- In-memory hiding technique☆63Updated last year
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆68Updated 2 weeks ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr …☆60Updated 3 weeks ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago