zimnyaa / nim-noload-dll-hollowing
Unused DLL hollowing PoC in Nim
☆17Updated 3 years ago
Alternatives and similar repositories for nim-noload-dll-hollowing:
Users that are interested in nim-noload-dll-hollowing are comparing it to the libraries listed below
- A simple Nim stager (w/ fiber execution)☆16Updated 3 years ago
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- ☆19Updated 2 years ago
- ☆43Updated last year
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated 2 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- ☆48Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆24Updated 2 weeks ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆20Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- Sample Rust Hooking Engine☆36Updated last year
- ☆29Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- ☆36Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 4 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Self Delete DLL☆23Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year