ProcessusT/UnhookingDLL
This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hollowing
C++
Stargazers
- 0range-xTencent
- 0xKatze
- a7t0fwa7
- Aekras1a127.0.0.1/Australia
- antx-code
- arsiumAway.
- AssassinUKG
- bambooqj
- binarytrails
- bleonproko
- D2550China
- DemiOneA
- dur4ngSpain
- enkianuUS
- H1ghC0ntr4sT
- hxhBrofessor
- Iveco
- kleiton0x00Austria
- Lifka@Malwarebytes
- ll11l1lIllIl1lllNothing to see here, move along.
- nclvCalypt
- oakkayaFuzzerland
- ongyuann
- paran0ids0ulr00t
- rbwdennyRBW
- sgfshanghai.cn
- sh4hin
- theLSAChina
- TonicBoomerKewlTonic's Mods
- user23333
- winterrdogNo_such_file_or_directory
- x-Ai
- y11en@y11en
- Yu3t
- zavke
- zhzyker@0-sec @xiecat @pwnwiki-project @cisp-pte @YanYun-Lab