HulkOperator / AuthStagerLinks
☆56Updated 9 months ago
Alternatives and similar repositories for AuthStager
Users that are interested in AuthStager are comparing it to the libraries listed below
Sorting:
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- ☆34Updated 4 months ago
- Sniffing files generator☆59Updated 5 months ago
- ☆82Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- BOF for C2 framework☆41Updated 8 months ago
- in-process powershell runner for BRC4☆46Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆25Updated 6 months ago
- ☆53Updated 2 months ago
- ☆59Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆80Updated last week
- POC of GITHUB simple C2 in rust☆53Updated this week
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 5 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆53Updated 3 months ago
- Section-based payload obfuscation technique for x64☆64Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆95Updated last month
- ☆29Updated last year
- ☆47Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 9 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆30Updated 2 weeks ago
- Tool to aid in dumping LSASS process remotely☆40Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 5 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆55Updated 5 months ago
- ☆48Updated 2 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆47Updated 2 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 5 months ago