0xcf80 / ShellCodeLoader_Indirect_SyscallsLinks
Shellcode Loader using indirect syscalls
☆16Updated last year
Alternatives and similar repositories for ShellCodeLoader_Indirect_Syscalls
Users that are interested in ShellCodeLoader_Indirect_Syscalls are comparing it to the libraries listed below
Sorting:
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 3 months ago
- I have documented all of the AMSI patches that I learned till now☆76Updated 2 weeks ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 6 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆58Updated 4 months ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- ☆50Updated 4 months ago
- Less sugar (entropy) for your binaries☆33Updated 2 months ago
- Mythic C2 Agent written in x64 PIC C☆83Updated 9 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆84Updated 6 months ago
- ☆37Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- ☆32Updated 9 months ago
- ☆54Updated 5 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆101Updated 3 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- ☆31Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 7 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated 3 weeks ago
- ☆52Updated last month
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆76Updated 3 weeks ago
- Self-mutating macOS implant☆96Updated this week
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆109Updated 9 months ago
- Arsenal of modules to beacon postex formats like BOF/Shellcode including: dotnet in memory execution, lateral moviment (scm, winrm, dcom,…☆68Updated last week