rbmm / DirectSysCall
☆12Updated last year
Alternatives and similar repositories for DirectSysCall:
Users that are interested in DirectSysCall are comparing it to the libraries listed below
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- ☆53Updated 2 years ago
- Dangling COM Keys Finder☆17Updated 3 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 5 months ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆24Updated last week
- ☆24Updated 2 months ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆12Updated 6 months ago
- A lexer and parser for Sleep☆19Updated 3 months ago
- ☆21Updated 11 months ago
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆45Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- A simple PE loader.☆25Updated 2 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- example using NtCreateUserProcess in rust☆19Updated 3 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- ☆24Updated 3 years ago
- ☆15Updated 3 years ago
- run process as PPL Antimalware☆10Updated last year