M01N-Team / HeaderLessPELinks
☆244Updated 2 years ago
Alternatives and similar repositories for HeaderLessPE
Users that are interested in HeaderLessPE are comparing it to the libraries listed below
Sorting:
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- Windows LPE☆139Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Updated 3 years ago
- CobaltStrike beacon in rust☆208Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Updated 6 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆213Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Updated 5 months ago
- ☆62Updated last year
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Updated last year
- ☆100Updated 2 years ago
- A simple Sleepmask BOF example☆167Updated 2 months ago
- Misc TaskScheduler Plays☆238Updated 3 years ago
- A Tool that aims to evade av with binary padding☆160Updated last year
- A basic emulation of an "RPC Backdoor"☆242Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆243Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆336Updated 3 years ago
- Silently Install Chrome Extension For Persistence☆97Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆139Updated 3 years ago
- ☆59Updated last year
- Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.☆129Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆241Updated 2 years ago
- Weaponized HellsGate/SigFlip☆204Updated 2 years ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆263Updated 11 months ago
- ☆143Updated 2 years ago
- An implementation of an indirect system call☆132Updated 2 years ago