zimnyaa / insomniaLinks
a stage1 DLL loader with sleep obfuscation
☆37Updated 2 years ago
Alternatives and similar repositories for insomnia
Users that are interested in insomnia are comparing it to the libraries listed below
Sorting:
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆31Updated 3 years ago
- ☆32Updated 6 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆48Updated 9 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆43Updated last week
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 9 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆59Updated 7 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆26Updated last year
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 11 months ago
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- ☆42Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Next gen process injection technique☆54Updated 4 years ago
- Shellcode Loader Utilizing ETW Events☆63Updated 3 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Malware?☆70Updated 8 months ago
- Heap encryption in Nim☆19Updated 10 months ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆25Updated 2 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆64Updated last month
- API Hammering with C++20☆46Updated 2 years ago
- Sample Rust Hooking Engine☆36Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆72Updated 7 months ago
- shell code example☆49Updated last month
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- idk man this was the default github name☆35Updated 2 years ago