nnot09 / direct-syscall
A simple example on how to initiate a direct syscall on WoW64
☆10Updated 6 years ago
Alternatives and similar repositories for direct-syscall:
Users that are interested in direct-syscall are comparing it to the libraries listed below
- a stage1 DLL loader with sleep obfuscation☆33Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆79Updated 4 months ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆111Updated 3 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 4 months ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- ☆37Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 4 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆40Updated 4 months ago
- ☆105Updated 2 years ago
- ☆41Updated 2 years ago
- Next gen process injection technique☆43Updated 4 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 8 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆132Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆88Updated 7 months ago