Example code samples from our ScriptBlock Smuggling Blog post
☆94Jun 18, 2024Updated last year
Alternatives and similar repositories for ScriptBlock-Smuggling
Users that are interested in ScriptBlock-Smuggling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# port from Invoke-GhostTask☆121Jan 5, 2024Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆155Jun 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆644May 8, 2025Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year
- ☆156Oct 2, 2023Updated 2 years ago
- ☆207May 29, 2024Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- ☆221Mar 26, 2024Updated 2 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆257Jun 6, 2024Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆91May 15, 2024Updated 2 years ago
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆291Jan 21, 2024Updated 2 years ago
- Reflective DLL Injection Made Bella☆250Jan 6, 2025Updated last year
- ☆161Jan 27, 2025Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆342Aug 7, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆596Mar 19, 2024Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- ☆164May 5, 2025Updated last year
- ☆236Jun 10, 2025Updated 11 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆306Jul 31, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆63Nov 8, 2024Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆288Jun 8, 2023Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆735May 7, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆159Nov 7, 2023Updated 2 years ago
- ☆52Mar 30, 2026Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆471Aug 2, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year