zero2504 / FrostLock-InjectionLinks
FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a target process, inject shellcode, and then seamlessly resume (thaw) it.
☆42Updated 8 months ago
Alternatives and similar repositories for FrostLock-Injection
Users that are interested in FrostLock-Injection are comparing it to the libraries listed below
Sorting:
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆33Updated 11 months ago
- ForsHops☆59Updated 9 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆73Updated 5 months ago
- ☆100Updated 2 years ago
- Threadless shellcode injection tool☆67Updated last year
- Shellcode Loader Utilizing ETW Events☆67Updated 10 months ago
- A process injection technique using only thread context manipulation☆39Updated 2 years ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆180Updated 2 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- ☆98Updated last year
- ☆127Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆113Updated last week
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 11 months ago
- ☆35Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 6 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Updated 6 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Updated last month
- UDC2 implementation that provides an ICMP C2 channel☆103Updated last month
- Proxy function calls through the thread pool with ease☆31Updated 10 months ago
- Linker for Beacon Object Files☆144Updated last week
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- ☆54Updated 7 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- ☆86Updated 11 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆71Updated last month