oldboy21 / JayFinder
Find DLLs with RWX section
☆75Updated last year
Related projects ⓘ
Alternatives and complementary repositories for JayFinder
- ☆73Updated last year
- Simple BOF to read the protection level of a process☆104Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- ☆118Updated last year
- Lateral Movement via the .NET Profiler☆76Updated 5 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- ☆108Updated last year
- ☆133Updated last year
- ☆96Updated last year
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- ☆59Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- ☆117Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- ☆103Updated 6 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆95Updated last year
- Do some DLL SideLoading magic☆75Updated last year
- ☆119Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated 9 months ago
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- Implant drop-in for EDR testing☆128Updated last year
- Just another C2 Redirector using CloudFlare.☆78Updated 6 months ago
- Tool for playing with Windows Access Token manipulation.☆51Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 3 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆75Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆114Updated 5 months ago
- ☆61Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆74Updated 3 months ago