CBLabresearch / ClematisLinks
PE to shellcode
☆256Updated 11 months ago
Alternatives and similar repositories for Clematis
Users that are interested in Clematis are comparing it to the libraries listed below
Sorting:
- Process injection alternative☆344Updated last year
- beta☆119Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆290Updated 7 months ago
- A Tool that aims to evade av with binary padding☆155Updated last year
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆208Updated 3 years ago
- ☆100Updated 2 years ago
- Next Generation C2 Framework, IoM-server/client☆395Updated last week
- IoM implant, C2 Framework and Infrastructure☆241Updated 3 weeks ago
- Open repository for learning dynamic shellcode loading (sample in many programming languages)☆271Updated 4 months ago
- CPP AV/EDR Killer☆461Updated 2 years ago
- Resolve the issue of DLLmain function in white and black DLLs hanging when calling shellcode☆195Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆279Updated 8 months ago
- A Windows potato to privesc☆387Updated last year
- Binary Hollowing☆85Updated last year
- ☆243Updated 2 years ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆41Updated 6 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆424Updated last year
- C2 redirector base on caddy☆210Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆252Updated 2 weeks ago
- AdaptixFramework Extension Kit☆306Updated last week
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆399Updated 2 years ago
- windows-rs shellcode loaders☆381Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆196Updated 6 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆131Updated 4 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆322Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆455Updated 2 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆365Updated 2 years ago
- Remote-shellcode loader in pure Rust☆25Updated 11 months ago
- A Blind EDR Project for Educational Purposes☆91Updated 10 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year