OffenseTeacher / SteganimLinks
☆47Updated 2 years ago
Alternatives and similar repositories for Steganim
Users that are interested in Steganim are comparing it to the libraries listed below
Sorting:
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 8 months ago
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- ☆59Updated last year
- Python module for running BOFs☆72Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- BOF for C2 framework☆42Updated 9 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆36Updated 3 months ago
- Sniffing files generator☆59Updated 5 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆34Updated 4 months ago
- in-process powershell runner for BRC4☆46Updated last year
- Click Once + App Domain☆63Updated last year
- ☆57Updated 9 months ago
- miscellaneous codes☆35Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆20Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- ☆48Updated 2 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆38Updated last month
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Golang Implementation of Hell's gate☆18Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆54Updated 4 months ago
- RPC to WebClient startup☆34Updated this week