k4yt3x / InstantSuspendLinks
Instantly suspend processes to bypass kernel driver protections.
☆19Updated 7 months ago
Alternatives and similar repositories for InstantSuspend
Users that are interested in InstantSuspend are comparing it to the libraries listed below
Sorting:
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆21Updated 3 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 9 months ago
- Change hash for a signed pe☆16Updated 2 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 2 months ago
- BYOVD Technique Example using viragt64 driver☆46Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Beacon Debugger☆40Updated 9 months ago
- Rust bindings for VMProtect.☆26Updated last year
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆29Updated last week
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- A VMWare logger using built-in backdoor.☆30Updated 9 months ago
- LLVM based obfuscation engine☆95Updated last month
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆25Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 3 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆34Updated 3 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated 8 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆82Updated this week
- bootlicker: A terribly written but functioning UEFI shellcode bootkit patched into a firmware volume or boot device on the EFI partition☆30Updated 5 months ago
- doesnt work and wont work on it anymore☆9Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated 2 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆86Updated last month
- ☆11Updated 3 years ago
- In-memory hiding technique☆56Updated 7 months ago
- ☆39Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 6 months ago
- ☆22Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago