CBLabresearch / ClematisLinks
PE to shellcode
☆226Updated 7 months ago
Alternatives and similar repositories for Clematis
Users that are interested in Clematis are comparing it to the libraries listed below
Sorting:
- not a reverse-engineered version of the Cobalt Strike Beacon☆381Updated last year
- beta☆118Updated 10 months ago
- Next Generation C2 Framework☆350Updated last week
- A Tool that aims to evade av with binary padding☆154Updated last year
- Process injection alternative☆338Updated 11 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆281Updated 3 months ago
- ☆98Updated last year
- C2 redirector base on caddy☆205Updated last year
- A Windows potato to privesc☆378Updated 11 months ago
- ☆241Updated last year
- Binary Hollowing☆78Updated 10 months ago
- Open repository for learning dynamic shellcode loading (sample in many programming languages)☆258Updated last week
- IoM implant, C2 Framework and Infrastructure☆204Updated 3 weeks ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆385Updated 2 years ago
- Resolve the issue of DLLmain function in white and black DLLs hanging when calling shellcode☆171Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆40Updated 2 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆190Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆267Updated 4 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆125Updated 2 weeks ago
- Misc TaskScheduler Plays☆235Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆315Updated last year
- Take a screenshot without injection for Cobalt Strike☆197Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆244Updated last year
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆364Updated 2 years ago
- GetProcAddressByHash/remap/full dll unhooking/Tartaru's Gate/Spoofing Gate/universal/Perun's Fart/Spoofing-Gate/EGG/RecycledGate/syswhisp…☆321Updated 10 months ago
- AdaptixFramework Extension Kit☆199Updated last week
- A beacon object file implementation of PoolParty Process Injection Technique.☆403Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆230Updated last month
- more conveniently Visual-Studio-BOF-template☆67Updated last year
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆229Updated 5 months ago