Ntdll Unhooking POC
☆19Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for JmpUnhook
Users that are interested in JmpUnhook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reflective DLL injection Execution☆20Sep 9, 2022Updated 3 years ago
- dump lsass☆37May 24, 2022Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- golang amsi bypass☆30Dec 4, 2021Updated 4 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆220Nov 5, 2021Updated 4 years ago
- Golang evasion tool, execute-assembly .Net file☆98Apr 25, 2022Updated 3 years ago
- Examples how to use a Assm (Assembly) in a go.☆24Apr 21, 2025Updated 11 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Fork & modify of Wireguard's Memmod☆34Aug 2, 2023Updated 2 years ago
- Beacon Object File (BOF) for remote process injection via thread hijacking☆220Jan 13, 2021Updated 5 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- DLL Unhooking☆12Mar 26, 2021Updated 4 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆148Oct 27, 2025Updated 4 months ago
- ☆153Jan 6, 2023Updated 3 years ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- load assembly executable file in memory☆41Aug 11, 2023Updated 2 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 11 months ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago