ASP4RUX / ReflectionUnHookLinks
☆11Updated 6 months ago
Alternatives and similar repositories for ReflectionUnHook
Users that are interested in ReflectionUnHook are comparing it to the libraries listed below
Sorting:
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Enumerate the Domain for Readable and Writable Shares☆18Updated 3 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆12Updated 3 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆30Updated last week
- ☆25Updated 3 months ago
- ☆28Updated this week
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Scripts to interact with Microsoft Graph APIs☆40Updated 6 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Cobalt Strike BOFS☆16Updated last year
- ☆27Updated 2 years ago
- in-process powershell runner for BRC4☆45Updated last year
- ☆38Updated 3 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- A small red team course☆39Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- ☆48Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆24Updated 3 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆34Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated last month
- ☆15Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 10 months ago
- ☆31Updated this week
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 3 months ago
- ☆15Updated 2 years ago