pulpocaminante / PPL-0dayLinks
Demoting PPL anti-malware services to less than a guest user
☆63Updated 5 months ago
Alternatives and similar repositories for PPL-0day
Users that are interested in PPL-0day are comparing it to the libraries listed below
Sorting:
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 8 months ago
- shell code example☆57Updated 2 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 5 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 4 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆57Updated 4 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- ☆86Updated 10 months ago
- Rust template/library for implementing your own COFF loader☆56Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆87Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- "Service-less" driver loading☆155Updated 7 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆92Updated 4 months ago
- A synergized Visual Studio and Rust development environment☆18Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆51Updated 5 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 5 months ago
- ☆35Updated 6 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆66Updated 2 months ago
- ☆107Updated 8 months ago
- Callstack spoofing using a VEH because VEH all the things.☆22Updated 4 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆50Updated 10 months ago
- Mythic C2 Agent written in x64 PIC C☆80Updated 5 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆44Updated 2 months ago
- A collection of position independent coding resources☆80Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- BOF for C2 framework☆41Updated 8 months ago