CICADA8-Research / TypeLibWalker
TypeLib persistence technique
☆70Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for TypeLibWalker
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆42Updated 8 months ago
- ☆95Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated 9 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆78Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆94Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆54Updated 7 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆29Updated last year
- ☆20Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆36Updated 11 months ago
- ☆34Updated last year
- Threadless shellcode injection tool☆59Updated 3 months ago
- ☆75Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆19Updated last week
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆113Updated last year
- ☆51Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆70Updated 3 weeks ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆87Updated 9 months ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 2 months ago
- Beacon Object Files (not Buffer Overflows)☆51Updated last year
- Sleep obfuscation☆82Updated this week
- ☆88Updated 2 months ago
- ☆44Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆55Updated last year
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆49Updated 2 years ago
- ☆61Updated 9 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆37Updated 10 months ago