timwhitez / Doge-newSyscall
use shellcode as asm function
☆23Updated 3 years ago
Alternatives and similar repositories for Doge-newSyscall:
Users that are interested in Doge-newSyscall are comparing it to the libraries listed below
- desktop screenshot☆29Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- unhook etw by golang☆10Updated 3 years ago
- ☆19Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- ☆30Updated 2 years ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆38Updated 2 years ago
- DLL Unhooking☆12Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Stop Windows Defender programmatically☆15Updated 3 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 7 months ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆21Updated 10 months ago
- Load ssp dll golang implementation☆19Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- dump lsass☆37Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- resource-based constrained delegation RBCD☆44Updated 3 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- ☆45Updated 10 months ago
- ☆40Updated last year
- ☆22Updated last year
- ☆22Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year