timwhitez / Doge-sRDI
Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode
☆57Updated 3 years ago
Related projects: ⓘ
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆38Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- Windows API Call Obfuscation☆86Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- bring your own vulnerable driver☆66Updated last year
- An implementation of an indirect system call☆99Updated last year
- It stinks☆99Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆41Updated 2 years ago
- Kill Protected Process Light Process (include av)☆55Updated last year
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆41Updated 2 years ago
- ☆54Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Kernel file/process/object tool