k4yt3x / InstantSuspend
Instantly suspend processes to bypass kernel driver protections.
☆17Updated 5 months ago
Alternatives and similar repositories for InstantSuspend
Users that are interested in InstantSuspend are comparing it to the libraries listed below
Sorting:
- Change hash for a signed pe☆16Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆16Updated 2 months ago
- A VMWare logger using built-in backdoor.☆29Updated 7 months ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 5 months ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- ☆19Updated 2 months ago
- ☆39Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆18Updated last month
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated last year
- ☆10Updated 3 years ago
- ☆21Updated last year
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- Usermode access to arbitrary physical memory☆13Updated 5 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Lightweight Threat Detection System - (Base)☆14Updated last year
- Rust bindings for VMProtect.☆26Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆26Updated 10 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 3 weeks ago
- doesnt work and wont work on it anymore☆10Updated 10 months ago
- Detect BypassUAC using AMSI☆23Updated 2 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆20Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 5 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 8 months ago
- In-memory hiding technique☆50Updated 4 months ago