0xm4ud / MSB-AL-BypassLinks
MSBuild AL bypass
☆14Updated 2 years ago
Alternatives and similar repositories for MSB-AL-Bypass
Users that are interested in MSB-AL-Bypass are comparing it to the libraries listed below
Sorting:
- Beacon Object Files.☆35Updated last year
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- ☆9Updated last year
- Some Cyber Security related scripts☆18Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆56Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆23Updated 5 years ago
- DLL Unhooking☆12Updated 4 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- ☆45Updated 3 months ago
- A Simple ShellcodeLoader☆11Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- HookDetection☆45Updated 3 years ago
- ☆13Updated 2 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Updated 5 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- ☆51Updated 5 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago