k4yt3x / InstantSuspendLinks
Instantly suspend processes to bypass kernel driver protections.
☆21Updated last year
Alternatives and similar repositories for InstantSuspend
Users that are interested in InstantSuspend are comparing it to the libraries listed below
Sorting:
- LLVM based obfuscation engine☆108Updated 5 months ago
- merge rust-lang's llvm and KomiMoe's Arkari (llvm) to produce obfuscated llvm for rustc☆31Updated last week
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆124Updated last month
- Rust bindings for VMProtect.☆26Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 6 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆109Updated last year
- Implementation of sllvm obfuscator☆66Updated 3 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆40Updated this week
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆132Updated 2 years ago
- ☆12Updated 3 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Updated 8 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 7 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆91Updated 5 months ago
- ☆62Updated 4 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆75Updated last year
- A C# implementation that disables Windows Firewall bypassing UAC☆16Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆24Updated last year
- ANY.RUN sandbox detection collection☆22Updated last year
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆15Updated 3 weeks ago
- MCP for reverse engineering☆46Updated 8 months ago
- A C++/Asm template for PIC/EXE/DLL malware☆25Updated 4 months ago
- Detect BypassUAC using AMSI☆29Updated 9 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated 5 months ago
- Linux Process Injection via Seccomp Notifier☆46Updated this week
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆48Updated 5 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Updated last year
- ☆42Updated 9 months ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆63Updated 2 years ago