ItsSunshineXD / GalaxyGateLinks
A C Implementation for using a new method to invoke undetectable indirect syscalls
☆20Updated last month
Alternatives and similar repositories for GalaxyGate
Users that are interested in GalaxyGate are comparing it to the libraries listed below
Sorting:
- Detect BypassUAC using AMSI☆29Updated 11 months ago
- A basic C2 framework written in C☆60Updated last year
- Change hash for a signed pe☆17Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆95Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Core Submodule of Exploration C2☆23Updated 2 weeks ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- A Simple PoC☆22Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆53Updated last year
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆46Updated 4 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated 2 years ago
- Beacon Object File (BOF) Template☆61Updated last year
- ☆41Updated 2 years ago
- ☆62Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆52Updated 6 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Updated 2 years ago
- A COFF Loader written in Rust☆134Updated last month
- An implementation of an indirect system call☆131Updated 2 years ago
- Windows C++ Implant for Exploration C2☆45Updated last month
- find dll base addresses without PEB WALK☆156Updated 6 months ago
- bring your own vulnerable driver☆112Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Arsenal of modules to beacon postex☆92Updated last month
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Updated 4 years ago