Kara-4search / EarlyBirdInjection_CSharp
Inject shellcode into process via "EarlyBird"
☆26Updated 3 years ago
Alternatives and similar repositories for EarlyBirdInjection_CSharp:
Users that are interested in EarlyBirdInjection_CSharp are comparing it to the libraries listed below
- A care package of useful bofs for red team engagments☆55Updated 4 months ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆104Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆51Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11Updated 11 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Flexible C# shellcode runner☆39Updated 3 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 5 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- HookDetection☆46Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- ☆62Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆85Updated 2 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆11Updated 11 months ago
- ☆80Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆69Updated 6 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆44Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆50Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆133Updated 3 years ago