nccgroup / DetectWindowsCopyOnWriteForAPI
Enumerate various traits from Windows processes as an aid to threat hunting
☆183Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DetectWindowsCopyOnWriteForAPI
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆163Updated last year
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- ☆128Updated 2 years ago
- Detect strange memory regions and DLLs☆170Updated 2 years ago
- Evasive Process Hollowing Techniques☆134Updated 4 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆115Updated 2 years ago
- Achieve execution using a custom keyboard layout☆161Updated last year
- WTSRM☆199Updated 2 years ago
- ☆207Updated 2 years ago
- ☆67Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆199Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆173Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆67Updated 2 years ago
- You shall pass☆249Updated 2 years ago
- ☆106Updated last year
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆97Updated 2 years ago
- Overwrite a process's recovery callback and execute with WER☆102Updated 2 years ago
- It's pointy and it hurts!☆122Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆159Updated 4 years ago
- Execute PowerShell code at the antimalware-light protection level.☆137Updated last year
- Example code for EDR bypassing☆146Updated 5 years ago
- ☆152Updated last year
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- Project to check which Nt/Zw functions your local EDR is hooking☆179Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆185Updated 4 years ago