killvxk / awesome_shell_loaders
shellcode-loaders and beacon-loaders
☆64Updated last year
Alternatives and similar repositories for awesome_shell_loaders:
Users that are interested in awesome_shell_loaders are comparing it to the libraries listed below
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆54Updated last month
- Windows Defender VDM lua collections☆48Updated 2 years ago
- Kill Protected Process Light Process (include av)☆55Updated last year
- Beacon compiled using clang☆63Updated 2 years ago
- Hide Port In Windows☆38Updated 3 months ago
- ☆56Updated 2 years ago
- An implementation of an indirect system call☆119Updated last year
- Kernel file/process/object tool☆64Updated 3 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆65Updated 2 years ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆58Updated 3 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆71Updated 11 months ago
- ☆40Updated 3 years ago
- ☆79Updated 3 years ago
- shellcode生成框架☆85Updated 6 months ago
- 简单版的PE加载器☆12Updated 4 years ago
- It stinks☆101Updated 2 years ago
- ☆32Updated 4 years ago
- ☆91Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆39Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- ☆36Updated 4 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated last year
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆61Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆50Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago