Mr-Un1k0d3r / DLLsForHackersView external linksLinks
Dll that can be used for side loading and other attack vector.
☆204Sep 17, 2020Updated 5 years ago
Alternatives and similar repositories for DLLsForHackers
Users that are interested in DLLsForHackers are comparing it to the libraries listed below
Sorting:
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆768Sep 4, 2024Updated last year
- Red Team C code repo☆569Dec 16, 2024Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- C# Script used for Red Team☆724Nov 16, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,164Mar 31, 2021Updated 4 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Oct 29, 2024Updated last year
- ☆362Apr 24, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 2 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆119Sep 29, 2020Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- ☆413Apr 28, 2021Updated 4 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆610Feb 16, 2023Updated 2 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆216Oct 8, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- Collection of Beacon Object Files☆633Nov 1, 2022Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆292Mar 8, 2023Updated 2 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆270Jun 13, 2020Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago