0xsp-SRD / callback_injection-CsharpLinks
this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback functions
☆87Updated 3 years ago
Alternatives and similar repositories for callback_injection-Csharp
Users that are interested in callback_injection-Csharp are comparing it to the libraries listed below
Sorting:
- .NET project for installing Persistence☆63Updated 3 years ago
- ☆70Updated 3 years ago
- ☆94Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆83Updated 3 years ago
- ☆142Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆88Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆104Updated 4 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- A simple BOF that frees UDRLs☆121Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- C# Port of LdapRelayScan☆86Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆111Updated 3 years ago
- ☆88Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆101Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Updated 3 years ago
- ☆130Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆130Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆136Updated last year
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆108Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Updated 4 years ago