mannyfred / SentinelBruh
Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution
☆37Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for SentinelBruh
- Malware?☆69Updated last month
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆102Updated last month
- ☆81Updated 2 months ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆159Updated last year
- Threadless shellcode injection tool☆59Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 2 months ago
- ☆59Updated 5 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆94Updated 7 months ago
- ☆116Updated 2 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- ☆95Updated last year
- Rust port of LayeredSyscall, designed to perform indirect syscalls while generating legitimate API call stack frames by abusing Vectored …☆89Updated last week
- ☆108Updated last year
- Splitting and executing shellcode across multiple pages☆99Updated last year
- ☆133Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆117Updated 2 months ago
- Heap encryption in Nim☆19Updated 2 months ago
- A process injection technique using only thread context manipulation☆23Updated 10 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆54Updated 7 months ago
- Template-based generation of shellcode loaders☆65Updated 6 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆127Updated 2 years ago
- ☆118Updated last year
- early cascade injection PoC based on Outflanks blog post☆91Updated this week
- Patch AMSI and ETW in remote process via direct syscall☆77Updated 2 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆75Updated last year
- a stage1 DLL loader with sleep obfuscation☆32Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- ☆27Updated 2 months ago
- Recursive Loader☆102Updated last month