Kudaes / CustomEntryPointLinks
Select any exported function in a dll as the new dll's entry point.
☆81Updated 10 months ago
Alternatives and similar repositories for CustomEntryPoint
Users that are interested in CustomEntryPoint are comparing it to the libraries listed below
Sorting:
- ☆100Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆78Updated 3 months ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 4 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Early Bird APC Injection in Rust☆58Updated 10 months ago
- ☆82Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- ☆88Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- ☆61Updated last year
- Linker for Beacon Object Files☆126Updated last month
- Identify and exploit leaked handles for local privilege escalation.☆109Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- ☆87Updated 2 years ago
- ☆36Updated 2 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 6 months ago
- remote process injections using pool party techniques☆66Updated last month
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆130Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Repo that holds random POCs☆51Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Template-based generation of shellcode loaders☆79Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated 2 years ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆131Updated last year
- ☆79Updated last year