Kudaes / Bin-FinderLinks
Detect EDR's exceptions by inspecting processes' loaded modules
☆130Updated last year
Alternatives and similar repositories for Bin-Finder
Users that are interested in Bin-Finder are comparing it to the libraries listed below
Sorting:
- Rusty Impersonate☆101Updated 3 weeks ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Your syscall factory☆125Updated last month
- ☆137Updated 2 years ago
- ☆159Updated 10 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆101Updated 3 years ago
- An App Domain Manager Injection DLL PoC on steroids☆203Updated last year
- Early Bird APC Injection in Rust☆62Updated last year
- Windows Persistence IT-Security☆106Updated 8 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆122Updated 11 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆104Updated 6 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆114Updated 3 months ago
- A hoontr must hoont☆101Updated 2 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ☆121Updated 4 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆123Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Implant drop-in for EDR testing☆146Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆273Updated last year
- ☆151Updated 2 years ago
- ☆125Updated last year
- Select any exported function in a dll as the new dll's entry point.☆80Updated last year
- ☆122Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆188Updated 11 months ago
- ☆135Updated 8 months ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆132Updated 2 years ago
- EDRSandblast-GodFault☆268Updated 2 years ago