susMdT / SharpIndirectSyscallsLinks
☆11Updated 2 years ago
Alternatives and similar repositories for SharpIndirectSyscalls
Users that are interested in SharpIndirectSyscalls are comparing it to the libraries listed below
Sorting:
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 8 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆26Updated 6 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- miscellaneous codes☆35Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- API Hammering with C++20☆49Updated 3 years ago
- A bunch of shenanigans using functions, VEH and more☆36Updated 4 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 6 months ago
- idk man this was the default github name☆35Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆67Updated 8 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- ☆47Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆38Updated 6 months ago
- A pure C version of SymProcAddress☆30Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆66Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 11 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆44Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- Post-Ex BOF tooling for Hannibal☆24Updated 11 months ago