MaorSabag / LoaderInjector
☆19Updated 2 years ago
Alternatives and similar repositories for LoaderInjector:
Users that are interested in LoaderInjector are comparing it to the libraries listed below
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆43Updated last year
- ☆29Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- ☆36Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆68Updated 2 years ago
- ☆48Updated last year
- ☆39Updated 2 years ago
- ☆28Updated 8 months ago
- All my POC related to malware development☆11Updated 10 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆24Updated 10 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- The Web UI for Antnium☆26Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Smuggle a file to a user's browser☆19Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Bunch of BOF files☆30Updated 3 months ago