rad9800 / talks
☆35Updated last month
Alternatives and similar repositories for talks:
Users that are interested in talks are comparing it to the libraries listed below
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- ☆30Updated 4 months ago
- ☆41Updated 3 weeks ago
- BOF for C2 framework☆41Updated 5 months ago
- Sample Rust Hooking Engine☆36Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- macOS dylib stager☆32Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 7 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 8 months ago
- ☆48Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆86Updated 8 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- API Hammering with C++20☆46Updated 2 years ago
- ForsHops☆41Updated 3 weeks ago
- shell code example☆34Updated this week
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 9 months ago
- A pure C version of SymProcAddress☆26Updated last year
- A work in progress BOF/COFF loader in Rust☆46Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 3 months ago
- A process injection technique using only thread context manipulation☆28Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- ☆29Updated 4 months ago
- use python on windows with full submodule support without installation☆27Updated 2 months ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆65Updated 5 months ago