Friends-Security / RedirectThread
Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techniques
☆36Updated this week
Alternatives and similar repositories for RedirectThread
Users that are interested in RedirectThread are comparing it to the libraries listed below
Sorting:
- ELF Beacon Object File (BOF) Template☆19Updated 6 months ago
- ☆11Updated 3 months ago
- A lexer and parser for Sleep☆19Updated this week
- Extension functionality for the NightHawk operator client☆27Updated last year
- BOF for C2 framework☆41Updated 6 months ago
- Simple reverse ICMP shell☆14Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- ☆23Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- ☆15Updated last week
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- example using NtCreateUserProcess in rust☆19Updated 3 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- various methods of making API calls☆17Updated 3 months ago
- Cobalt Strike notifications via NTFY.☆13Updated 7 months ago
- ☆26Updated 2 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆27Updated 3 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 3 weeks ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 3 months ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated last month
- ☆24Updated 2 months ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆17Updated 9 months ago
- Dump Teams conversations☆19Updated 3 years ago