GeorgePatsias / PayloadFactory
C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.
☆35Updated 3 years ago
Alternatives and similar repositories for PayloadFactory:
Users that are interested in PayloadFactory are comparing it to the libraries listed below
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆39Updated 4 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- ☆29Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- ☆82Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆54Updated 8 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- ☆19Updated 2 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆14Updated 4 months ago
- Caeser Cipher your shellcode!☆20Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆26Updated 3 years ago
- ☆43Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆74Updated 2 years ago