nothingspecialforu / EvtPsstLinks
EvtPsst
☆55Updated last year
Alternatives and similar repositories for EvtPsst
Users that are interested in EvtPsst are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆58Updated 10 months ago
- ☆47Updated 2 years ago
- miscellaneous codes☆34Updated last year
- A pure C version of SymProcAddress☆29Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- BOF for C2 framework☆43Updated 10 months ago
- ☆76Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Proxy function calls through the thread pool with ease☆29Updated 6 months ago
- Sniffing files generator☆59Updated 6 months ago
- in-process powershell runner for BRC4☆47Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 9 months ago
- Sample Rust Hooking Engine☆36Updated last year
- ☆36Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 7 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated 9 months ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 10 months ago
- Find DLLs with RWX section☆81Updated 2 years ago