paranoidninja / PI-TrackerLinks
A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback hook and 'ProcessInstrumentationCallback' class to track all syscalls being performed via the userland.
☆12Updated last year
Alternatives and similar repositories for PI-Tracker
Users that are interested in PI-Tracker are comparing it to the libraries listed below
Sorting:
- ☆31Updated 9 months ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- ☆43Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 4 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- A VSCode plugin to assist with BOF development.☆37Updated last year
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- A bunch of shenanigans using functions, VEH and more☆36Updated 4 months ago
- A simple BOF (Beacon Object File) to search files in the system☆15Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- ☆62Updated 3 years ago
- ☆15Updated 3 years ago
- idk man this was the default github name☆35Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- ☆58Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 4 years ago
- Sleep Obfuscation☆45Updated 3 years ago
- A lexer and parser for Sleep☆20Updated 5 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 6 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- One gate to all syscalls!☆23Updated 3 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Updated 2 years ago