x0reaxeax / SysCook64Links
Indirect Syscall invocation via thread hijacking
☆17Updated 2 years ago
Alternatives and similar repositories for SysCook64
Users that are interested in SysCook64 are comparing it to the libraries listed below
Sorting:
- Rewrite to fit my needs☆30Updated last year
- ☆47Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 7 months ago
- EvtPsst☆55Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- Section-based payload obfuscation technique for x64☆64Updated 11 months ago
- Unhook Ntdll.dll, Go & C++.☆27Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 2 months ago
- ☆59Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- ☆34Updated 3 months ago
- Splitting and executing shellcode across multiple pages☆102Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated 11 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆68Updated 3 months ago
- Sleep Obfuscation☆45Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Malware?☆72Updated 9 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 5 months ago
- in-process powershell runner for BRC4☆46Updated last year
- Linux Sleep Obfuscation☆105Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- a stage1 DLL loader with sleep obfuscation☆37Updated 2 years ago
- ☆34Updated 4 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆53Updated 3 months ago