MaorSabag / LoaderInjector
☆19Updated 2 years ago
Alternatives and similar repositories for LoaderInjector
Users that are interested in LoaderInjector are comparing it to the libraries listed below
Sorting:
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 5 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- ☆29Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- ☆48Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- ☆36Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆25Updated 3 years ago
- ☆40Updated 2 years ago
- ☆48Updated 2 years ago
- ☆43Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- A VSCode plugin to assist with BOF development.☆36Updated 9 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- C# project to Reflectively load .Net assemblies in memory☆17Updated 10 months ago
- Bunch of BOF files☆31Updated 4 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago