Kara-4search / ThreadHijacking_CSharpLinks
Process inject technique "Thread hijacking" via csharp
☆15Updated 4 years ago
Alternatives and similar repositories for ThreadHijacking_CSharp
Users that are interested in ThreadHijacking_CSharp are comparing it to the libraries listed below
Sorting:
- ProcessHollowing via csharp☆13Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 4 years ago
- It stinks☆104Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆66Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆82Updated 3 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆61Updated 3 years ago
- My personal shellcode loader☆32Updated 2 years ago
- MappingInjection via csharp☆40Updated 4 years ago
- HookDetection☆45Updated 4 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- ☆59Updated 3 years ago
- C++ WinRM API via Reflective DLL☆145Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆101Updated 4 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆44Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆17Updated 4 years ago
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Updated 2 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆85Updated 3 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- UUID based Shellcode loader for your favorite C2☆86Updated 4 years ago
- Command line & PPID spoofing☆29Updated 2 years ago
- Flexible C# shellcode runner☆39Updated 4 years ago