Kara-4search / HellgateLoader_CSharp
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
☆15Updated 3 years ago
Alternatives and similar repositories for HellgateLoader_CSharp:
Users that are interested in HellgateLoader_CSharp are comparing it to the libraries listed below
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆121Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆138Updated 3 years ago
- It stinks☆101Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆120Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Updated 2 years ago
- A simple BOF that frees UDRLs☆115Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆63Updated 3 months ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆135Updated 2 years ago
- ☆79Updated last year
- In-memory token vault BOF for Cobalt Strike☆138Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆124Updated 2 years ago
- Load shellcode via syscall☆47Updated 3 years ago
- ☆150Updated last year
- HookDetection☆44Updated 3 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆53Updated 9 months ago
- Flexible C# shellcode runner☆38Updated 3 years ago
- my learning case about windows☆21Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆132Updated 2 years ago
- MappingInjection via csharp☆37Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆32Updated 2 years ago
- ShellCodeLoader via DInvoke☆53Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- A Cobalt Strike memory evasion loader for redteamers☆97Updated last year
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆63Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆134Updated 2 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- ☆138Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆41Updated 2 years ago