timwhitez / Etwti-UnhookPOCLinks
Etwti-UnhookPOC just for test
☆11Updated 2 years ago
Alternatives and similar repositories for Etwti-UnhookPOC
Users that are interested in Etwti-UnhookPOC are comparing it to the libraries listed below
Sorting:
- Ntdll Unhooking POC☆19Updated 2 years ago
- ☆29Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago
- A simple BOF (Beacon Object File) to search files in the system☆14Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆20Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆45Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆43Updated last year
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆22Updated 2 years ago
- x64 version☆36Updated 3 years ago
- ☆21Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- ☆23Updated 3 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- Cobalt Strike Get clipboard plugin☆14Updated last year
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆34Updated 3 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Updated 4 years ago
- ☆27Updated 5 months ago
- A VSCode plugin to assist with BOF development.☆37Updated 10 months ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆23Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago