timwhitez / Doge-newSyscallLinks
use shellcode as asm function
☆23Updated 3 years ago
Alternatives and similar repositories for Doge-newSyscall
Users that are interested in Doge-newSyscall are comparing it to the libraries listed below
Sorting:
- UAC_wenpon☆49Updated 3 years ago
- bypass UAC even when configured to always notify user☆30Updated 4 years ago
- desktop screenshot☆29Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- ☆30Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆17Updated last year
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- Code with Windows Hacker☆12Updated 2 years ago
- use aswArPot.sys to kill process☆68Updated 3 years ago
- A simple hidden vnc.☆33Updated 4 years ago
- DLL Unhooking☆13Updated 4 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- ☆19Updated 3 years ago
- Load ssp dll golang implementation☆19Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Stop Windows Defender programmatically☆15Updated 3 years ago
- ☆74Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆44Updated 3 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- CS http Dynamic Encrypt Bridge.☆46Updated 3 years ago
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- ☆42Updated last year
- cmd2shellcode☆79Updated 4 years ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago