Load shellcode via syscall
☆56Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for SysCall_ShellcodeLoad_Csharp
Users that are interested in SysCall_ShellcodeLoad_Csharp are comparing it to the libraries listed below
Sorting:
- ShellCodeLoader via DInvoke☆60Jul 5, 2021Updated 4 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- Command line & PPID spoofing☆29Apr 15, 2023Updated 2 years ago
- Bypass windows eventlogs & Sysmon☆20Aug 24, 2021Updated 4 years ago
- Bypassing ETW with Csharp☆27Oct 28, 2021Updated 4 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- Bypass AMSI☆13Aug 8, 2021Updated 4 years ago
- 基于csharp实现的免杀shellcode加载器☆31May 18, 2021Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- Inject shellcode into process via "EarlyBird"☆26Aug 30, 2021Updated 4 years ago
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- HookDetection☆45Sep 3, 2021Updated 4 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- ShellCode Loader for MSF and Cobalt Strike☆56May 7, 2024Updated last year
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Jul 10, 2020Updated 5 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- 过木马免杀制作器☆55Sep 26, 2023Updated 2 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆128Dec 2, 2019Updated 6 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Jul 2, 2021Updated 4 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- BitRat Source Code☆42Oct 23, 2020Updated 5 years ago
- 泛微OA_V9全版本前台任意文件上传漏洞☆29Apr 26, 2022Updated 3 years ago
- Cobalt Strike Shellcode Generator☆670Jan 8, 2025Updated last year
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- Open repository for learning dynamic shellcode loading (sample in many programming languages)☆273Jul 30, 2025Updated 6 months ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- js免杀shellcode,绕过杀毒添加自启☆354Mar 16, 2021Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆148Sep 1, 2021Updated 4 years ago