knight0x07 / NailaoLoader-Hiding-Execution-FlowLinks
NailaoLoader: Hiding Execution Flow via Patching
☆22Updated 10 months ago
Alternatives and similar repositories for NailaoLoader-Hiding-Execution-Flow
Users that are interested in NailaoLoader-Hiding-Execution-Flow are comparing it to the libraries listed below
Sorting:
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 11 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆33Updated 11 months ago
- ☆99Updated last year
- converts sRDI compatible dlls to shellcode☆35Updated last year
- Shellcode Loader Utilizing ETW Events☆67Updated 10 months ago
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated 11 months ago
- ☆50Updated 6 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Updated 11 months ago
- A bunch of shenanigans using functions, VEH and more☆37Updated 7 months ago
- use python on windows with full submodule support without installation☆30Updated 11 months ago
- ☆52Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆97Updated 2 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- ☆38Updated 9 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆42Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- BOF for C2 framework☆44Updated last year
- ☆100Updated 2 years ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 4 months ago
- A synergized Visual Studio and Rust development environment☆19Updated 11 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- A Crystal Palace shared library to resolve & perform syscalls☆54Updated 2 months ago