Accenture / Codecepticon
.NET/PowerShell/VBA Offensive Security Obfuscator
☆486Updated last year
Alternatives and similar repositories for Codecepticon:
Users that are interested in Codecepticon are comparing it to the libraries listed below
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆698Updated 6 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆644Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆909Updated 9 months ago
- C# tool for UAC bypasses☆421Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆411Updated 2 years ago
- Collection of remote authentication triggers in C#☆475Updated 9 months ago
- C# Based Universal API Unhooker☆396Updated 3 years ago
- Inject .NET assemblies into an existing process☆487Updated 3 years ago
- Command and Control Framework written in C#☆394Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆486Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆428Updated 2 years ago
- A .NET Framework 4.0 Windows Agent☆464Updated last week
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆246Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆536Updated last year
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆449Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆399Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆748Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆518Updated 2 years ago
- Various ways to execute shellcode☆487Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆266Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆576Updated 4 months ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆468Updated 2 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆391Updated 6 months ago
- .net config loader☆313Updated last year
- .NET project for installing Persistence☆463Updated 8 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆723Updated 2 years ago
- Various Cobalt Strike BOFs☆617Updated 2 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆574Updated 2 months ago