Bl4ckM1rror / ZombieThread
☆115Updated this week
Related projects: ⓘ
- ☆138Updated this week
- ☆82Updated 2 years ago
- Run Your Payload Without Running Your Payload☆174Updated last year
- ☆159Updated last year
- POC for frustrating/defeating Malware Analysts☆149Updated 2 years ago
- ☆96Updated this week
- Github as C2 Demonstration , free API = free C2 Infrastructure☆128Updated last year
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆141Updated last year
- Code dump from PEN-300/OSEP updated 2022☆39Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- ☆105Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- A shellcode injection tool showcasing various process injection techniques☆133Updated 9 months ago
- Patch AMSI and ETW☆227Updated 4 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆219Updated last year
- random code snippets, useful for getting started☆108Updated 2 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- Do some DLL SideLoading magic☆72Updated 11 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆164Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 11 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- Infect Shared Files In Memory for Lateral Movement☆191Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆256Updated 10 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- ☆110Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆41Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated 8 months ago