A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing
☆29Oct 22, 2020Updated 5 years ago
Alternatives and similar repositories for Ampulex
Users that are interested in Ampulex are comparing it to the libraries listed below
Sorting:
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆12May 27, 2025Updated 9 months ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Protected Process Light Library☆18Jun 20, 2020Updated 5 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Oct 10, 2021Updated 4 years ago
- An azure devops tool for moar automation :D☆19Dec 8, 2022Updated 3 years ago
- ☆70Apr 21, 2021Updated 4 years ago
- ☆22Jul 10, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Driver Initial Reconnaissance Tool☆126Dec 26, 2019Updated 6 years ago
- Append a custom data payload to a digitally signed NSIS .exe installer☆24Jan 11, 2023Updated 3 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆102Jan 7, 2022Updated 4 years ago
- Slide decks and/or materials from conference presentations☆56Nov 15, 2022Updated 3 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago