Iansus / DllProxy
☆17Updated last year
Alternatives and similar repositories for DllProxy:
Users that are interested in DllProxy are comparing it to the libraries listed below
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- The Totally Legit Authentication Dialog☆12Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- A simple to use single-include Windows API resolver☆20Updated 7 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆28Updated 7 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- ☆16Updated 11 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆11Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 9 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- OSED Practice binary☆24Updated last year
- A lexer and parser for Sleep☆16Updated last month
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- ☆23Updated 2 weeks ago
- ☆12Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆13Updated 4 months ago
- ☆47Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆23Updated 9 months ago
- ☆21Updated last year
- AMSI detection PoC☆31Updated 4 years ago
- ☆23Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago