zimnyaa / insomnia
a stage1 DLL loader with sleep obfuscation
☆35Updated 2 years ago
Alternatives and similar repositories for insomnia:
Users that are interested in insomnia are comparing it to the libraries listed below
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- ☆29Updated 4 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- Malware?☆69Updated 6 months ago
- A process injection technique using only thread context manipulation☆28Updated last year
- Shellcode Loader Utilizing ETW Events☆63Updated last month
- Next gen process injection technique☆52Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 7 months ago
- ☆55Updated 3 months ago
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆37Updated 7 months ago
- ☆36Updated 2 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- ☆98Updated last year
- shell code example☆34Updated last week
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- Splitting and executing shellcode across multiple pages☆100Updated last year
- Rust template/library for implementing your own COFF loader☆50Updated 2 months ago
- Proxy function calls through the thread pool with ease☆25Updated last month
- ForsHops☆41Updated 3 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- Get your data from the resource section manually, with no need for windows apis☆61Updated 6 months ago
- A work in progress BOF/COFF loader in Rust☆47Updated 2 years ago
- stack spoofing☆84Updated 5 months ago
- ☆82Updated 7 months ago
- ☆42Updated 2 years ago