M01N-Team / HeaderLessPELinks
☆244Updated 2 years ago
Alternatives and similar repositories for HeaderLessPE
Users that are interested in HeaderLessPE are comparing it to the libraries listed below
Sorting:
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆132Updated 5 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- Windows LPE☆138Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆203Updated 3 years ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆210Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- ☆62Updated last year
- CobaltStrike beacon in rust☆208Updated last year
- A simple Sleepmask BOF example☆161Updated last month
- ☆100Updated 2 years ago
- Misc TaskScheduler Plays☆236Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆182Updated 4 months ago
- A Tool that aims to evade av with binary padding☆160Updated last year
- Silently Install Chrome Extension For Persistence☆95Updated last year
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- An implementation of an indirect system call☆131Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆243Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 3 years ago
- ☆58Updated last year
- Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.☆128Updated 3 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆139Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆335Updated 2 years ago
- Beacon compiled using clang☆72Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago