Alh4zr3d / ProcessInjectionPOCs
Proof-of-Concept code snippets for a variety of different process injection techniques
☆23Updated 2 years ago
Alternatives and similar repositories for ProcessInjectionPOCs:
Users that are interested in ProcessInjectionPOCs are comparing it to the libraries listed below
- ☆57Updated last year
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆55Updated 2 years ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Payload Generation Framework☆89Updated 11 months ago
- Identifies the bytes that Microsoft Defender flags on.☆82Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆133Updated 6 months ago
- ☆29Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆141Updated last month
- SeManageVolumePrivilege to SYSTEM☆87Updated last year
- ☆113Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆107Updated 3 weeks ago
- D/Invoke standalone shellcode runners☆37Updated last year
- Tools I use on red team engagements and more☆32Updated 11 months ago
- ☆192Updated 10 months ago
- A collection of code snippets built to assist with breaking chains.☆116Updated 9 months ago
- Make everyone in your VLAN ASRep roastable☆177Updated last week
- a port of privkit bof for havoc☆23Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆85Updated 9 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆104Updated last year
- ☆132Updated 7 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 7 months ago
- ☆79Updated last month
- Evade EDR's the simple way, by not touching any of the API's they hook.☆84Updated 3 weeks ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆69Updated 3 years ago
- Most Responder's configuration power in your hand.☆44Updated last month
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆31Updated 3 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆109Updated 9 months ago