x0reaxeax / Fetch-n-ExecLinks
An x64 binary executing code that's not inside of it.
☆17Updated 2 years ago
Alternatives and similar repositories for Fetch-n-Exec
Users that are interested in Fetch-n-Exec are comparing it to the libraries listed below
Sorting:
- Just another casual shellcode native loader☆25Updated 4 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Updated 2 years ago
- A simple PE loader.☆27Updated 3 years ago
- ☆30Updated 5 months ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- ☆19Updated 4 months ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- ☆38Updated 2 years ago
- API Hammering with C++20☆49Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- Process Injection: APC Injection☆32Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- really ?☆12Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Updated 9 months ago
- ☆17Updated 8 months ago
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆20Updated 4 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43Updated 2 years ago
- Dangling COM Keys Finder☆17Updated 4 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- ☆60Updated 3 years ago
- ☆17Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆35Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Updated last year