Mr-Un1k0d3r / .NetConfigLoaderLinks
.net config loader
☆330Updated last year
Alternatives and similar repositories for .NetConfigLoader
Users that are interested in .NetConfigLoader are comparing it to the libraries listed below
Sorting:
- Attempt at Obfuscated version of SharpCollection☆216Updated last week
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆292Updated last year
- Kill AV/EDR leveraging BYOVD attack☆359Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆467Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆546Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆607Updated 2 weeks ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆485Updated 3 weeks ago
- Creating a repository with all public Beacon Object Files (BoFs)☆502Updated last year
- Open Source C&C Specification☆258Updated 3 months ago
- ☆299Updated 7 months ago
- A BOF that runs unmanaged PEs inline☆603Updated 7 months ago
- ☆277Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆191Updated 2 years ago
- ☆380Updated 2 years ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Updated 9 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆260Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆249Updated 2 months ago
- COM Hijacking VOODOO☆298Updated 2 months ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆454Updated 10 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆440Updated 2 weeks ago
- A PowerShell console in C/C++ with all the security features disabled☆244Updated 2 weeks ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆325Updated 10 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆305Updated last year
- ☆304Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆442Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆514Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆322Updated 2 years ago
- Protected Process Dumper Tool☆549Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆337Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆378Updated 10 months ago