Bl4ckM1rror / FUD-UUID-ShellcodeLinks
☆325Updated 2 years ago
Alternatives and similar repositories for FUD-UUID-Shellcode
Users that are interested in FUD-UUID-Shellcode are comparing it to the libraries listed below
Sorting:
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆378Updated 10 months ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆247Updated 2 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆416Updated last year
- Performing Indirect Clean Syscalls☆550Updated 2 years ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆442Updated 2 years ago
- Command and Control Framework written in C#☆408Updated last year
- A Payload Loader Designed With Advanced Evasion Features☆512Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆308Updated 9 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆607Updated 2 weeks ago
- Modules used by the Havoc Framework☆238Updated 11 months ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆479Updated 2 years ago
- XLL Phishing Tradecraft☆423Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆259Updated last year
- Payload Loader With Evasion Features☆318Updated 2 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆372Updated last year
- Kill AV/EDR leveraging BYOVD attack☆359Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆558Updated 5 months ago
- Terminate AV/EDR Processes using kernel driver☆344Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆454Updated 10 months ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆939Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆440Updated 2 weeks ago
- Go shellcode loader that combines multiple evasion techniques☆370Updated last year
- Lifetime AMSI bypass☆627Updated last year
- Various Cobalt Strike BOFs☆650Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆234Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆494Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆671Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆496Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆684Updated 2 months ago