knight0x07 / NailaoLoader-Hiding-Execution-FlowLinks
NailaoLoader: Hiding Execution Flow via Patching
☆20Updated 6 months ago
Alternatives and similar repositories for NailaoLoader-Hiding-Execution-Flow
Users that are interested in NailaoLoader-Hiding-Execution-Flow are comparing it to the libraries listed below
Sorting:
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 3 months ago
- ☆28Updated 7 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆55Updated this week
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- ☆50Updated last month
- ☆30Updated 5 months ago
- ☆53Updated 8 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆85Updated last month
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆15Updated 6 months ago
- ☆29Updated last year
- ☆88Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆85Updated last week
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 6 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- BOF for C2 framework☆42Updated 9 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆34Updated 3 weeks ago
- ☆100Updated last year
- Shellcode Loader Utilizing ETW Events☆65Updated 6 months ago
- Linux Sleep Obfuscation☆105Updated last year
- Less sugar (entropy) for your binaries☆34Updated 5 months ago
- Threadless shellcode injection tool☆66Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- use python on windows with full submodule support without installation☆30Updated 7 months ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated 10 months ago