CICADA8-Research / IHxExec
Process injection alternative
☆321Updated 6 months ago
Alternatives and similar repositories for IHxExec:
Users that are interested in IHxExec are comparing it to the libraries listed below
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆302Updated 11 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆371Updated last year
- CPP AV/EDR Killer☆390Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆262Updated last month
- A Beacon Object File (BOF) template for Visual Studio☆170Updated 7 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆245Updated 11 months ago
- Bypassing UAC with SSPI Datagram Contexts☆430Updated last year
- Some POCs for my BYOVD research and find some vulnerable drivers☆179Updated 6 months ago
- Reflective DLL Injection Made Bella☆219Updated 2 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆318Updated last year
- ☆237Updated last year
- not a reverse-engineered version of the Cobalt Strike Beacon☆352Updated 11 months ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆168Updated 11 months ago
- Generic PE loader for fast prototyping evasion techniques☆227Updated 8 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆239Updated 7 months ago
- A Tool that aims to evade av with binary padding☆147Updated 8 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆118Updated 3 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆390Updated 7 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆314Updated 2 years ago
- Execute shellcode files with rundll32☆191Updated last year
- Windows LPE☆119Updated 9 months ago
- ☆322Updated last month
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆277Updated 9 months ago
- Shellcode obfuscation tool to avoid AV/EDR.☆126Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆180Updated last year
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆160Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆237Updated 9 months ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆201Updated 2 weeks ago
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆389Updated last year