reversinghub / hide-and-seek
PoC for hiding processes from Windows Task Manager by manipulating the graphic interface
☆44Updated 4 years ago
Alternatives and similar repositories for hide-and-seek:
Users that are interested in hide-and-seek are comparing it to the libraries listed below
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- Header only library for obfuscation import winapi functions.☆40Updated last month
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆110Updated 3 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- Static Obfuscar Deobfuscator☆21Updated 5 years ago
- Variety of different process injections implemented in C++☆24Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆56Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆85Updated this week
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆103Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆53Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆106Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- ☆59Updated 2 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- Read my blog for more info -☆31Updated 3 years ago