MzHmO / articlesLinks
☆43Updated 4 months ago
Alternatives and similar repositories for articles
Users that are interested in articles are comparing it to the libraries listed below
Sorting:
- ☆71Updated last year
- ☆90Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 9 months ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆48Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆116Updated 10 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- Template-based generation of shellcode loaders☆78Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆74Updated 2 months ago
- ☆88Updated 2 years ago
- Create Anti-Copy DRM Malware☆59Updated 11 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆98Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆58Updated last month
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆79Updated 2 years ago
- A C# port from Invoke-GhostTask☆117Updated last year
- ☆96Updated 10 months ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated last month
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated 2 years ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Execute commands in other Sessions☆90Updated 11 months ago
- Identify and exploit leaked handles for local privilege escalation.☆109Updated 2 years ago
- Sliver agent rewritten in C++☆45Updated 10 months ago
- To audit the security of read-only domain controllers☆117Updated last year