3xpl01tc0d3r / Obfuscator
The program is designed to obfuscate the shellcode.
☆193Updated 3 years ago
Related projects: ⓘ
- Create a minidump of the LSASS process from memory☆254Updated last year
- New UAC bypass for Silent Cleanup for CobaltStrike☆187Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆259Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆328Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆342Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆300Updated 3 years ago
- ☆310Updated this week
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆214Updated last year
- .NET Project for performing Authenticated Remote Execution☆369Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆299Updated 3 years ago
- ☆345Updated 3 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆253Updated 2 years ago
- Managed assembly shellcode generation☆261Updated 3 years ago
- Run Rubeus via Rundll32☆193Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆374Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆150Updated 4 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆142Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆229Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆265Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆302Updated 2 years ago
- ☆150Updated this week
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆114Updated last year
- C# Based Universal API Unhooker☆391Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆262Updated 4 months ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆263Updated last year
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆461Updated 2 years ago
- Dump stuff without touching disk☆156Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago