Skip to content
View topstrelok's full-sized avatar

Block or report topstrelok

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.

C++ 50 11 Updated Feb 29, 2024

Implementation of Indirect Syscall technique to pop a calc.exe

C++ 111 17 Updated Jan 25, 2024

Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.

C 69 11 Updated Dec 23, 2023

A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.

C++ 198 34 Updated Dec 27, 2023

This repository implements Threadless Injection in C

C 171 33 Updated Dec 23, 2023

A beacon object file implementation of PoolParty Process Injection Technique.

C 421 49 Updated Dec 21, 2023

C++ self-Injecting dropper based on various EDR evasion techniques.

C 414 71 Updated Feb 11, 2024

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 661 87 Updated Dec 23, 2022
C++ 137 22 Updated Jun 21, 2023

Single stub direct and indirect syscalling with runtime SSN resolving for windows.

C 138 21 Updated Sep 12, 2022

Single stub direct and indirect syscalling with runtime SSN resolving for windows.

Rust 227 34 Updated Mar 23, 2023

Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users

C++ 42 13 Updated Oct 5, 2022

🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.(使用C和Intel x86汇编开发的Windows x86可执行文件打包工具,打包后的新文件可以阻碍逆向工程。)

C 347 54 Updated Oct 22, 2024

Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.

C++ 119 24 Updated Apr 22, 2021

A tool to kill antimalware protected processes

C 1,483 249 Updated Jun 19, 2021

Patch AMSI and ETW in remote process via direct syscall

C 83 10 Updated Apr 28, 2022

Source code of exploiting windows API for red teaming series

C++ 150 25 Updated Sep 25, 2022