Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection
☆72Dec 26, 2025Updated 3 months ago
Alternatives and similar repositories for GhostlyHollowingViaTamperedSyscalls2
Users that are interested in GhostlyHollowingViaTamperedSyscalls2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jul 1, 2025Updated 8 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- A C# PE loader for x64 and x86 PE files.☆50Mar 9, 2026Updated 2 weeks ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆93Jan 2, 2026Updated 2 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- UDC2 implementation that provides an ICMP C2 channel☆118Nov 24, 2025Updated 4 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆42Mar 13, 2026Updated 2 weeks ago
- Bof of RegPwn by MDSec☆93Mar 15, 2026Updated 2 weeks ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆97Dec 22, 2025Updated 3 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆89Feb 9, 2026Updated last month
- A cross-platform C++ framework for building Windows shellcode☆165Mar 4, 2026Updated 3 weeks ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- Shellcode loader☆102Nov 24, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20Sep 6, 2025Updated 6 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆297Feb 2, 2026Updated last month
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆214Aug 21, 2025Updated 7 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- One WSL BOF to rule them all☆165Jan 14, 2026Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆164Mar 15, 2026Updated 2 weeks ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆40Nov 11, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆39Aug 5, 2025Updated 7 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago