GhostPack / Lockless
Lockless allows for the copying of locked files.
☆237Updated 3 years ago
Alternatives and similar repositories for Lockless:
Users that are interested in Lockless are comparing it to the libraries listed below
- Create a minidump of the LSASS process from memory☆255Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- .NET Project for performing Authenticated Remote Execution☆391Updated last year
- Managed assembly shellcode generation☆264Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆246Updated 4 years ago
- ☆182Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆341Updated 4 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆328Updated 3 years ago
- ☆350Updated 2 years ago
- ☆351Updated 3 years ago
- Evading WinDefender ATP credential-theft☆254Updated 5 years ago
- Managed code hooking template.☆129Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆216Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆142Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆208Updated 4 years ago
- Run Rubeus via Rundll32☆199Updated 4 years ago
- dem sharp donuts☆188Updated 2 years ago
- Executes position independent shellcode from an encrypted zip☆300Updated 4 years ago
- ☆358Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆266Updated last year
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆241Updated 4 years ago
- ☆257Updated last year
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆297Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆253Updated 3 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆230Updated 4 years ago
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- ☆162Updated 2 years ago
- ☆132Updated 4 years ago