Dump-GUY / EXE-or-DLL-or-ShellCode
Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...
☆151Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for EXE-or-DLL-or-ShellCode
- Leverage WindowsApp createdump tool to obtain an lsass dump☆142Updated 2 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆266Updated 7 months ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆179Updated 2 months ago
- A Tool that aims to evade av with binary padding☆135Updated 4 months ago
- ApexLdr is a DLL Payload Loader written in C☆105Updated 4 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆227Updated 5 months ago
- A set of programs for analyzing common vulnerabilities in COM☆154Updated 2 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆200Updated 11 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆278Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆171Updated 10 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆324Updated 11 months ago
- Nameless C2 - A C2 with all its components written in Rust☆241Updated last month
- Bypass LSA protection using the BYODLL technique☆146Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆145Updated 3 weeks ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆164Updated 8 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆243Updated 5 months ago
- Some POCs for my BYOVD research and find some vulnerable drivers☆126Updated 2 months ago
- Weaponized HellsGate/SigFlip☆194Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆85Updated 8 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆241Updated 4 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆148Updated 5 months ago
- Evasive shellcode loader☆269Updated last month
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆148Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆147Updated 6 months ago
- Sleep obfuscation☆141Updated last week
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆163Updated last month
- Use hardware breakpoint to dynamically change SSN in run-time☆234Updated 7 months ago