knightswd / WindowsHackCodeLinks
Code with Windows Hacker
☆12Updated 3 years ago
Alternatives and similar repositories for WindowsHackCode
Users that are interested in WindowsHackCode are comparing it to the libraries listed below
Sorting:
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- ☆30Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Updated 4 years ago
- Reflective DLL injection Execution☆20Updated 3 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- Self Cleanup in post-ex job☆58Updated last year
- UAC_wenpon☆49Updated 3 years ago
- ☆19Updated 3 years ago
- AddDefenderExclusions Beacon Object File☆40Updated 2 years ago
- DLL Unhooking☆13Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆44Updated 3 years ago
- ☆43Updated 2 years ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated 2 years ago
- RawCopy - Golang implementation☆24Updated 3 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- Beacon compiled using clang☆72Updated 2 years ago
- ☆11Updated 2 years ago
- ☆51Updated 4 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- 一个demo☆23Updated last year
- use shellcode as asm function☆23Updated 3 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- desktop screenshot☆29Updated 2 years ago
- ☆28Updated 2 years ago
- 使用kcp实现的socks5正向代理☆12Updated last year
- vehsyscall:a syscall project that may bypass EDR☆60Updated last year