Maldev-Academy / GhostlyHollowingViaTamperedSyscalls2Links
ā55Updated last week
Alternatives and similar repositories for GhostlyHollowingViaTamperedSyscalls2
Users that are interested in GhostlyHollowingViaTamperedSyscalls2 are comparing it to the libraries listed below
Sorting:
- š§ The ultimate, community-curated resource for Beacon Object Files (BOFs) ā tutorials, how-tos, deep dives, and reference materials.ā95Updated 2 weeks ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+Sā¦ā98Updated last week
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspectiveā160Updated 3 weeks ago
- ā136Updated last month
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)ā195Updated 10 months ago
- Lateral Movement Bof with MSI ODBC Driver Installā141Updated 3 months ago
- ā53Updated 2 months ago
- ForsHopsā150Updated 9 months ago
- Evasive Payload Delivery Server & C2 Redirectorā112Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.ā95Updated 3 weeks ago
- ā121Updated 11 months ago
- adws enumeration bofā160Updated 3 months ago
- ā125Updated 3 weeks ago
- Lateral movement with DCOM DLL hijackingā174Updated 5 months ago
- BOF with Synthetic Stackframeā204Updated 2 months ago
- Local SYSTEM auth trigger for relayingā168Updated 5 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rustā57Updated last year
- Local SYSTEM auth trigger for relaying - Xā155Updated 5 months ago
- ā127Updated last year
- ā135Updated 11 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pā¦ā191Updated last month
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.ā14Updated 5 months ago
- ā139Updated last month
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.ā52Updated 2 weeks ago
- A hoontr must hoontā102Updated last month
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpointsā119Updated 5 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.ā105Updated 7 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingā133Updated 6 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā57Updated 9 months ago
- A Mythic agent for Windows written in Cā144Updated this week