unkvolism / Fuck-Etw
Bypass the Event Trace Windows(ETW) and unhook ntdll.
☆102Updated last year
Alternatives and similar repositories for Fuck-Etw:
Users that are interested in Fuck-Etw are comparing it to the libraries listed below
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Just another C2 Redirector using CloudFlare.☆84Updated 8 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- Do some DLL SideLoading magic☆77Updated last year
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- Create Anti-Copy DRM Malware☆51Updated 5 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated last month
- ☆120Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆84Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 8 months ago
- Local & remote Windows DLL Proxying☆161Updated 7 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- ☆106Updated 2 months ago
- .bin file to shellcode convertor☆31Updated 6 months ago
- A bunch of scripts and code i wrote.☆135Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆108Updated 8 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- Lateral Movement via the .NET Profiler☆77Updated 2 months ago
- Find DLLs with RWX section☆76Updated last year
- ☆137Updated 6 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆88Updated 2 years ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 9 months ago
- ☆180Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year