0x0ff537 / Process-InjectionLinks
Exploring different process injection techniques based on malware analysis
☆14Updated 2 years ago
Alternatives and similar repositories for Process-Injection
Users that are interested in Process-Injection are comparing it to the libraries listed below
Sorting:
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆151Updated 3 years ago
- ☆72Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Updated 3 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆220Updated 4 years ago
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- A simple BOF that frees UDRLs☆122Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆133Updated 3 years ago
- ☆143Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- Implant drop-in for EDR testing☆147Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Updated last year
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago
- Coerce Windows machines auth via MS-EVEN☆171Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆130Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆166Updated 5 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- ☆137Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆127Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆145Updated 4 years ago
- ☆161Updated 2 years ago
- ☆122Updated 2 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆101Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- ☆129Updated 2 years ago