Cybereason / siofra
☆485Updated 7 years ago
Alternatives and similar repositories for siofra:
Users that are interested in siofra are comparing it to the libraries listed below
- Process Injection☆761Updated 3 years ago
- ☆470Updated last year
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆388Updated 4 years ago
- Token Privilege Research☆815Updated 7 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆303Updated 2 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆948Updated 3 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆387Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,132Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆345Updated 5 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,531Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆805Updated 5 years ago
- Dump the memory of a PPL with a userland exploit☆870Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,493Updated last year
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆523Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆461Updated 11 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆937Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,142Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆306Updated 5 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,261Updated 5 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- A memory scanning evasion technique☆865Updated 7 years ago
- DLL Hijacking Detection Tool☆517Updated 5 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆517Updated 5 years ago
- A modular C2 framework☆460Updated 3 weeks ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆608Updated 2 years ago
- Evade sysmon and windows event logging☆623Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆749Updated 4 years ago
- Extract Windows Defender database from vdm files and unpack it☆440Updated 5 years ago
- Expriments☆454Updated 7 months ago