Allevon412 / BreadManModuleStompingLinks
☆43Updated last year
Alternatives and similar repositories for BreadManModuleStomping
Users that are interested in BreadManModuleStomping are comparing it to the libraries listed below
Sorting:
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- ☆31Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- A care package of useful bofs for red team engagments☆55Updated 9 months ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆36Updated 4 years ago
- idk man this was the default github name☆35Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆58Updated last year
- ☆24Updated last year
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆51Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆15Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- ☆29Updated 7 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆26Updated 3 months ago
- Click Once + App Domain☆63Updated last year