nothingspecialforu / EvtPsstLinks
EvtPsst
☆55Updated 2 years ago
Alternatives and similar repositories for EvtPsst
Users that are interested in EvtPsst are comparing it to the libraries listed below
Sorting:
- ☆60Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆77Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- ☆47Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆58Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- ☆77Updated last year
- Sniffing files generator☆59Updated 8 months ago
- ☆31Updated last year
- BOF for C2 framework☆44Updated last year
- miscellaneous codes☆35Updated 2 years ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 9 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated 3 weeks ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 11 months ago
- Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictabili…☆69Updated this week
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A pure C version of SymProcAddress☆30Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- ☆37Updated 7 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year