Allevon412 / PPL_Sandboxer
☆81Updated 3 years ago
Alternatives and similar repositories for PPL_Sandboxer:
Users that are interested in PPL_Sandboxer are comparing it to the libraries listed below
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- ☆59Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆72Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- ☆50Updated 4 years ago
- ☆43Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- ☆56Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆73Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- all credits go to @mgeeky☆59Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- .NET project for installing Persistence☆64Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 11 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- HookDetection☆45Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- ☆29Updated 2 years ago
- A simple COM server which provides a component to run shellcode☆133Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- ☆36Updated 4 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago