zimnyaa / insomniaLinks
a stage1 DLL loader with sleep obfuscation
☆35Updated 2 years ago
Alternatives and similar repositories for insomnia
Users that are interested in insomnia are comparing it to the libraries listed below
Sorting:
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- ☆31Updated 5 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆31Updated 3 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 2 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated last year
- Next gen process injection technique☆53Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A python polymorphic engine for C programs☆12Updated last year
- Get your data from the resource section manually, with no need for windows apis☆62Updated 7 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 8 months ago
- API Hammering with C++20☆47Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 9 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆71Updated 6 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- ☆82Updated 9 months ago
- ☆42Updated 2 years ago
- Malware?☆70Updated 7 months ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆41Updated last year
- Piece of code to detect and remove hooks in IAT☆63Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆29Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- A process injection technique using only thread context manipulation☆38Updated last year
- ☆86Updated 9 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Shellcode capable of bypassing EAF / IAF mitigations☆12Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 10 months ago
- A simple example on how to initiate a direct syscall on WoW64☆11Updated 7 years ago