Cracked5pider / KaynLdr
KaynLdr is a Reflective Loader written in C/ASM
☆524Updated last year
Alternatives and similar repositories for KaynLdr:
Users that are interested in KaynLdr are comparing it to the libraries listed below
- TartarusGate, Bypassing EDRs☆561Updated 3 years ago
- ☆492Updated 3 months ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆650Updated last year
- ☆472Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆748Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆901Updated 8 months ago
- PIC lsass dumper using cloned handles☆580Updated 2 years ago
- Various ways to execute shellcode☆482Updated 11 months ago
- Sleep Obfuscation☆718Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆632Updated 2 years ago
- Collection of Beacon Object Files☆569Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆640Updated last year
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆273Updated last year
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆548Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,280Updated last year
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆321Updated 2 years ago
- A Highly capable Pe Packer☆691Updated 2 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆553Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆696Updated 5 months ago
- A little tool to play with the Seclogon service☆310Updated 2 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆352Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆469Updated 2 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆576Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆504Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆335Updated 3 years ago
- Aims to identify sleeping beacons☆562Updated 2 months ago
- Leaked Windows processes handles identification tool☆282Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆248Updated last year
- Performing Indirect Clean Syscalls☆513Updated last year
- Dump the memory of any PPL with a Userland exploit chain☆332Updated last year