Windows x64 Process Injection via Ghostwriting with Dynamic Configuration
☆29Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for DynimicGhostWriting
Users that are interested in DynimicGhostWriting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Apr 4, 2026Updated last month
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆17Jan 21, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆22Jun 21, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Apr 4, 2026Updated last month
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Process Ghosting in C#☆220Jan 24, 2022Updated 4 years ago
- A collection of weird ways to execute unmanaged code in .NET☆173May 4, 2021Updated 5 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 5 years ago
- Exploring in-memory execution of .NET☆138Apr 20, 2022Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆218Mar 30, 2022Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆103Jan 7, 2022Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Implant drop-in for EDR testing☆148Nov 15, 2023Updated 2 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 7 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆236Oct 18, 2022Updated 3 years ago
- A simple Go module to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authenticat…☆19Feb 20, 2026Updated 2 months ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆125May 24, 2022Updated 3 years ago