Linking pages
- Using Syscalls to Inject Shellcode on Windows - SolomonSklash.io https://www.solomonsklash.io/syscalls-for-shellcode-injection.html 12 comments
- Implementing Direct Syscalls Using Hell’s Gate – Team Hydra https://teamhydra.blog/2020/09/18/implementing-direct-syscalls-using-hells-gate/ 10 comments
- See Sharp (and more) in Operator - by Alex Manners https://feed.prelude.org/p/see-sharp-and-more-in-operator 0 comments
- Adventures in Dynamic Evasion. Most teams I have worked with rely… | by Matt Hand | Posts By SpecterOps Team Members https://posts.specterops.io/adventures-in-dynamic-evasion-1fe0bac57aa 0 comments
- GitHub - klezVirus/inceptor: Template-Driven AV/EDR Evasion Framework https://github.com/klezVirus/inceptor 0 comments
- Path to Process Injection — Bypass Userland API Hooking | by Seemant Bisht | Medium https://medium.com/@seemant.bisht24/path-to-process-injection-bypass-userland-api-hooking-a8a49ae5def6 0 comments
Linked pages
- Defeating Antivirus Real-time Protection From The Inside https://breakdev.org/defeating-antivirus-real-time-protection-from-the-inside/ 3 comments
- Silencing Cylance: A Case Study in Modern EDRs - MDSec https://www.mdsec.co.uk/2019/03/silencing-cylance-a-case-study-in-modern-edrs/ 3 comments
- NTAPI Undocumented Functions http://undocumented.ntinternals.net/ 0 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - jthuraisamy/SysWhispers: AV/EDR evasion via direct system calls.
See how to search.