injectEtwBypass
ETW bypass tool
Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall
CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
276 stars
7 watching
55 forks
Language: C
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that bypasses AMSI in a remote process with code injection. | 377 |
| A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 |
| A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| A tool that enables remote process shellcode execution using the Early Bird injection technique | 267 |
| A tool that bypasses UAC restrictions on Windows by deserializing and executing malicious code in Event Viewer. | 129 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| A tool for creating shellcode bypasses of antivirus software | 823 |
| A centralized resource for bypassing Windows Device Guard Application Whitelisting (WDAC) policies. | 489 |
| An extension that automatically adds headers to Burp requests to bypass certain Web Application Firewall products. | 330 |
| An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 |
| A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| A comprehensive collection of tools and techniques for web application security testing and exploitation | 61,904 |
| A tool that injects malicious code into the clipboard window of a remote process to execute custom shellcode | 65 |
| A technique to bypass Windows UAC security restrictions using a DLL planting method for executing malicious code in high integrity processes. | 190 |