Allevon412 / Capstone-Project
This project was for my senior capstone at the University of Arizona. I wanted to create a payload that would potentially bypass AV / EDR products using techniques that negate or circumvent detection techniques used by these products.
☆14Updated last year
Alternatives and similar repositories for Capstone-Project:
Users that are interested in Capstone-Project are comparing it to the libraries listed below
- A simple BOF (Beacon Object File) to search files in the system☆12Updated last year
- ☆13Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆33Updated 3 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆37Updated last year
- BypassCredGuard CS BOF☆32Updated 2 months ago
- ☆25Updated 2 months ago
- ☆43Updated last year
- Sliver agent rewritten in C++☆44Updated 6 months ago
- ☆36Updated 2 years ago
- ☆23Updated last week
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆14Updated 7 months ago
- Artemis - C++ Hell's Gate Syscall Implementation☆32Updated last year
- Execute dotnet app from unmanaged process☆71Updated 3 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆17Updated last year
- Indirect NT syscalls LSASS dumper.☆43Updated last year
- Threadless injection via TLS callbacks☆16Updated 4 months ago
- converts sRDI compatible dlls to shellcode☆22Updated 2 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆43Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆31Updated last week
- Beacon Debugger☆40Updated 5 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 6 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 10 months ago
- ☆28Updated 8 months ago
- ☆21Updated last month