Alh4zr3d / ProcessInjectionPOCsLinks
Proof-of-Concept code snippets for a variety of different process injection techniques
☆23Updated 2 years ago
Alternatives and similar repositories for ProcessInjectionPOCs
Users that are interested in ProcessInjectionPOCs are comparing it to the libraries listed below
Sorting:
- Payload Generation Framework☆93Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆117Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆61Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆124Updated 2 years ago
- ☆71Updated 6 months ago
- ☆204Updated last year
- A collection of code snippets built to assist with breaking chains.☆123Updated last year
- a port of privkit bof for havoc☆23Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆167Updated 3 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆196Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆137Updated last year
- ☆213Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Patch AMSI and ETW☆246Updated last year
- ☆29Updated last year
- Utilities for obfuscating shellcode☆94Updated 3 weeks ago
- D/Invoke standalone shellcode runners☆39Updated last year
- ☆312Updated 2 years ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆75Updated 3 months ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆163Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆90Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆294Updated 2 months ago
- ☆152Updated 6 months ago
- ☆183Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆166Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆267Updated 3 months ago
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Shellcode generation and encoding utility☆23Updated 3 years ago