Krypteria / ProxllLinks
Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h
☆41Updated last year
Alternatives and similar repositories for Proxll
Users that are interested in Proxll are comparing it to the libraries listed below
Sorting:
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆87Updated 3 weeks ago
- BOF for C2 framework☆44Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 11 months ago
- ☆109Updated 11 months ago
- Internal Monologue BOF☆79Updated last year
- Sniffing files generator☆60Updated 11 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Updated last year
- Lateral Movement via the .NET Profiler☆99Updated last year
- ☆55Updated 7 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Updated 7 months ago
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago
- Bunch of BOF files☆37Updated 6 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Updated 6 months ago
- ☆137Updated 11 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 8 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 6 months ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆38Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 5 months ago
- A hoontr must hoont☆101Updated 2 months ago
- Find jmp gadgets for call stack spoofing.☆75Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- RPC to WebClient startup☆54Updated 5 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated 4 months ago
- rust port of pspy with support for process monitoring over dbus☆35Updated 3 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year