 injectEtwBypass
 injectEtwBypass 
 ETW bypass tool
 Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall
CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
276 stars
 7 watching
 55 forks
 
Language: C 
last commit: about 4 years ago  Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A tool that bypasses AMSI in a remote process with code injection. | 377 | 
|  | A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 | 
|  | A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 | 
|  | A tool that enables remote process shellcode execution using the Early Bird injection technique | 267 | 
|  | A tool that bypasses UAC restrictions on Windows by deserializing and executing malicious code in Event Viewer. | 129 | 
|  | Loads and executes a malicious payload in a Windows system using PowerShell. | 245 | 
|  | Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 | 
|  | A tool for creating shellcode bypasses of antivirus software | 823 | 
|  | A centralized resource for bypassing Windows Device Guard Application Whitelisting (WDAC) policies. | 489 | 
|  | An extension that automatically adds headers to Burp requests to bypass certain Web Application Firewall products. | 330 | 
|  | An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 | 
|  | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 | 
|  | A comprehensive collection of tools and techniques for web application security testing and exploitation | 61,904 | 
|  | A tool that injects malicious code into the clipboard window of a remote process to execute custom shellcode | 65 | 
|  | A technique to bypass Windows UAC security restrictions using a DLL planting method for executing malicious code in high integrity processes. | 190 |