☆15Aug 17, 2023Updated 2 years ago
Alternatives and similar repositories for DarthNetLoader
Users that are interested in DarthNetLoader are comparing it to the libraries listed below
Sorting:
- ☆14Nov 29, 2021Updated 4 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- AV/EDR killer using BYOVD technique☆43Sep 27, 2024Updated last year
- ☆37Feb 11, 2023Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆102Aug 25, 2022Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Enabled / Disable LSA Protection via BYOVD☆81Dec 8, 2021Updated 4 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- An azure devops tool for moar automation :D☆19Dec 8, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Apr 24, 2022Updated 3 years ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago