GetRektBoy724 / TripleSLinks
Extracting Syscall Stub, Modernized
☆65Updated 3 years ago
Alternatives and similar repositories for TripleS
Users that are interested in TripleS are comparing it to the libraries listed below
Sorting:
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆96Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆57Updated 2 years ago
- C# Port of LdapRelayScan☆85Updated 3 years ago
- Flexible C# shellcode runner☆39Updated 3 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Updated 3 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆110Updated 3 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- ☆70Updated 2 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- ☆39Updated 2 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆119Updated 3 years ago