unkvolism / Fuck-Etw
Bypass the Event Trace Windows(ETW) and unhook ntdll.
☆102Updated last year
Alternatives and similar repositories for Fuck-Etw:
Users that are interested in Fuck-Etw are comparing it to the libraries listed below
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- Do some DLL SideLoading magic☆79Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 2 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆81Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- ☆120Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- ☆140Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Just another C2 Redirector using CloudFlare.☆87Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 8 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Splitting and executing shellcode across multiple pages☆99Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆56Updated 8 months ago
- Lateral Movement via the .NET Profiler☆80Updated 3 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- .bin file to shellcode convertor☆33Updated 7 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 10 months ago
- C# havoc implant☆98Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Find DLLs with RWX section☆76Updated last year