Idov31 / NidhoggScriptLinks
NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg
☆46Updated last year
Alternatives and similar repositories for NidhoggScript
Users that are interested in NidhoggScript are comparing it to the libraries listed below
Sorting:
- ☆157Updated 8 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆77Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆96Updated 4 months ago
- Find DLLs with RWX section☆81Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Stage 0☆163Updated 8 months ago
- Shellcode loader☆92Updated 9 months ago
- ☆110Updated 6 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆145Updated 9 months ago
- ☆124Updated 11 months ago
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 9 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆163Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 9 months ago
- Lateral movement with DCOM DLL hijacking☆137Updated last month
- ☆133Updated 6 months ago
- Impersonate Tokens using only NTAPI functions☆79Updated 4 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆130Updated 5 months ago
- A Mythic agent for Windows written in C☆132Updated last month
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆65Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆153Updated 3 weeks ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- A small How-To on creating your own weaponized WSL file☆113Updated last month
- ☆112Updated 9 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆161Updated last week