Indirect Syscall invocation via thread hijacking
☆26May 5, 2023Updated 2 years ago
Alternatives and similar repositories for SysCook64
Users that are interested in SysCook64 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- ☆13Feb 25, 2023Updated 3 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Feb 8, 2022Updated 4 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- 🪁 AOT binary translation toolchain☆59Mar 1, 2026Updated 3 weeks ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- ☆12Jul 28, 2018Updated 7 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- ☆17Dec 9, 2018Updated 7 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- binary instrumentation, analysis, and patching framework☆102Feb 20, 2026Updated last month
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability☆17Dec 1, 2024Updated last year
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- See https://github.com/NeverSight/mush-audit☆15Jan 10, 2026Updated 2 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserver☆13Dec 27, 2023Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆15Jan 10, 2024Updated 2 years ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago