CCob / ThreadlessInjectLinks
Threadless Process Injection using remote function hooking.
☆801Updated last year
Alternatives and similar repositories for ThreadlessInject
Users that are interested in ThreadlessInject are comparing it to the libraries listed below
Sorting:
- PoCs and tools for investigation of Windows process execution techniques☆954Updated last week
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆617Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆996Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆672Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆749Updated 5 months ago
- Performing Indirect Clean Syscalls☆596Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆630Updated 2 years ago
- Various ways to execute shellcode☆508Updated last year
- Lifetime AMSI bypass☆664Updated 2 years ago
- TartarusGate, Bypassing EDRs☆641Updated 3 years ago
- Sleep Obfuscation☆808Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆501Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆494Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆514Updated last year
- ☆501Updated 3 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,035Updated 3 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Updated last year
- ☆605Updated 5 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,037Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,080Updated last year
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆873Updated 5 years ago
- Protected Process Dumper Tool☆574Updated 2 years ago
- ☆560Updated last year
- A modern 32/64-bit position independent implant template☆1,284Updated 9 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆696Updated 8 months ago
- Aims to identify sleeping beacons☆650Updated 3 weeks ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆596Updated 3 years ago
- A BOF that runs unmanaged PEs inline☆677Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated 2 years ago