Adaptix-Framework / Extension-KitLinks
AdaptixFramework Extension Kit
☆215Updated 3 weeks ago
Alternatives and similar repositories for Extension-Kit
Users that are interested in Extension-Kit are comparing it to the libraries listed below
Sorting:
- A Tool that aims to evade av with binary padding☆154Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆245Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆267Updated 4 months ago
- TeamServer and Client of Exploration Command and Control Framework☆152Updated 3 weeks ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆232Updated 6 months ago
- AV bypass while you sip your Chai!☆224Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆284Updated 4 months ago
- Fileless atexec, no more need for port 445☆393Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆318Updated last year
- ☆337Updated 6 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆192Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆268Updated 4 months ago
- ☆230Updated last year
- Terminate AV/EDR Processes using kernel driver☆347Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆481Updated 3 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆405Updated last year
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆188Updated 2 weeks ago
- Homemade Aggressor scripts kit for Cobalt Strike☆74Updated 3 weeks ago
- Stealthily inject shellcode into an executable☆258Updated 2 months ago
- ☆220Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆235Updated 2 years ago
- A Windows potato to privesc☆379Updated 11 months ago
- A Beacon Object File (BOF) template for Visual Studio☆240Updated 2 weeks ago
- Credential Guard Bypass Via Patching Wdigest Memory☆330Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆252Updated 2 years ago
- ☆231Updated 9 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆481Updated 2 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 11 months ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆136Updated 2 years ago