zimawhit3 / DynimicGhostWritingView external linksLinks
Windows x64 Process Injection via Ghostwriting with Dynamic Configuration
☆29Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for DynimicGhostWriting
Users that are interested in DynimicGhostWriting are comparing it to the libraries listed below
Sorting:
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Aug 1, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- A collection of weird ways to execute unmanaged code in .NET☆174May 4, 2021Updated 4 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- Process Ghosting in C#☆219Jan 24, 2022Updated 4 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Exploring in-memory execution of .NET☆138Apr 20, 2022Updated 3 years ago
- A simple Go module to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authenticat…☆19Mar 14, 2025Updated 11 months ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- Run python from a single exe☆35May 1, 2022Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Mar 30, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Apr 21, 2022Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆145Feb 23, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- Search files for extensions as well as text within.☆120Sep 28, 2021Updated 4 years ago
- Windows API Call Obfuscation☆112Dec 9, 2022Updated 3 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Research project for understanding how Mimikatz work and become better at C☆125Oct 22, 2021Updated 4 years ago
- Nim Payload Generation☆62Oct 9, 2023Updated 2 years ago