Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis tool from malware detection
☆38Feb 20, 2025Updated last year
Alternatives and similar repositories for hollowise
Users that are interested in hollowise are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- command control framework☆33Mar 19, 2026Updated last week
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- ☆18Jun 25, 2024Updated last year
- ☆16Feb 27, 2026Updated last month
- ☆26Aug 11, 2025Updated 7 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ☆49Apr 9, 2025Updated 11 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- ☆53Sep 23, 2025Updated 6 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆34May 26, 2019Updated 6 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆47Dec 22, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- ☆53Aug 19, 2025Updated 7 months ago
- Hotkey-based keylogger for Windows☆33Oct 17, 2024Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65May 1, 2023Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆48Dec 5, 2025Updated 3 months ago
- ☆42Mar 24, 2024Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆182May 19, 2025Updated 10 months ago
- BOF with Synthetic Stackframe☆235Oct 30, 2025Updated 4 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 8 months ago