MaorSabag / LoaderInjectorLinks
☆19Updated 2 years ago
Alternatives and similar repositories for LoaderInjector
Users that are interested in LoaderInjector are comparing it to the libraries listed below
Sorting:
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆55Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 8 months ago
- ☆29Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆26Updated last year
- ☆43Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆36Updated 2 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- ☆40Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆28Updated 4 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- ☆25Updated 3 years ago
- in-process powershell runner for BRC4☆45Updated last year
- ☆39Updated 4 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago