0xm4ud / MSB-AL-Bypass
MSBuild AL bypass
☆14Updated last year
Alternatives and similar repositories for MSB-AL-Bypass:
Users that are interested in MSB-AL-Bypass are comparing it to the libraries listed below
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆56Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- DLL Unhooking☆12Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Load PE via XML Attribute☆29Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- ☆9Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆21Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Hide Port In Windows☆38Updated 4 months ago
- ☆51Updated 5 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- x64 version☆30Updated 3 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 2 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆19Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 3 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago
- RunPE using Hell's Gate technique.☆33Updated 4 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆53Updated 10 months ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 2 years ago
- ☆13Updated 2 years ago