ChoiSG / OneDriveUpdaterSideloadingLinks
Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post
☆97Updated 2 years ago
Alternatives and similar repositories for OneDriveUpdaterSideloading
Users that are interested in OneDriveUpdaterSideloading are comparing it to the libraries listed below
Sorting:
- Simple BOF to read the protection level of a process☆115Updated 2 years ago
- ☆70Updated 2 years ago
- ☆127Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆90Updated 5 months ago
- I have documented all of the AMSI patches that I learned till now☆72Updated 2 months ago
- ☆125Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- Do some DLL SideLoading magic☆84Updated last year
- Implant drop-in for EDR testing☆139Updated last year
- ☆142Updated 2 years ago
- ☆141Updated 3 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆67Updated 2 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- ☆88Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- C# havoc implant☆99Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆118Updated last year
- ☆136Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆93Updated last month
- ☆125Updated 9 months ago
- Find DLLs with RWX section☆81Updated last year
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆106Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 3 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- ☆122Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆155Updated last year