vatsalgupta67 / Process-Hollowing
Red Team Operation's Defense Evasion Technique.
☆52Updated 9 months ago
Alternatives and similar repositories for Process-Hollowing:
Users that are interested in Process-Hollowing are comparing it to the libraries listed below
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Do some DLL SideLoading magic☆80Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆47Updated 10 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- Splitting and executing shellcode across multiple pages☆100Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆36Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- ☆78Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- A pure C version of SymProcAddress☆26Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- Malware?☆69Updated 5 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Various methods of executing shellcode☆69Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- ☆121Updated last year
- Reasonably undetected shellcode stager and executer.☆36Updated 6 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year