FuzzySecurity / DLL-TemplateLinks
Simple skeleton for a CPP DLL
☆61Updated 5 years ago
Alternatives and similar repositories for DLL-Template
Users that are interested in DLL-Template are comparing it to the libraries listed below
Sorting:
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- pypykatz plugin for volatility3 framework☆45Updated 6 months ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Updated 4 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Updated 4 years ago
- ☆55Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- ☆60Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- ☆26Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- ☆94Updated 3 years ago
- ☆98Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 5 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- ☆37Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Updated 4 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Updated last year
- Python module for running BOFs☆79Updated 3 weeks ago
- My doodles as I learn C#☆74Updated 5 years ago