malwareninja / Mockingjay---Vulnerable-DLL-Finder
Mockingjay Process Injection Vulnerable DLL Finder
☆19Updated last year
Alternatives and similar repositories for Mockingjay---Vulnerable-DLL-Finder:
Users that are interested in Mockingjay---Vulnerable-DLL-Finder are comparing it to the libraries listed below
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Threadless injection via TLS callbacks☆16Updated 3 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 5 months ago
- ☆36Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- converts sRDI compatible dlls to shellcode☆20Updated last month
- ☆36Updated 2 years ago
- stack spoofing☆79Updated 3 months ago
- Various methods of executing shellcode☆68Updated last year
- Malware?☆69Updated 4 months ago
- ☆52Updated last month
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆81Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Sleep Obfuscation☆43Updated 2 years ago
- bring your own vulnerable driver☆91Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 11 months ago
- Section-based payload obfuscation technique for x64☆59Updated 6 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆85Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 3 months ago