Offensive-Panda / WPM-MAJIC-ENTRY-POINT-INJECTIONView external linksLinks
This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.
☆18Oct 31, 2024Updated last year
Alternatives and similar repositories for WPM-MAJIC-ENTRY-POINT-INJECTION
Users that are interested in WPM-MAJIC-ENTRY-POINT-INJECTION are comparing it to the libraries listed below
Sorting:
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Feb 17, 2024Updated last year
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- ☆13Oct 29, 2024Updated last year
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated last year
- Remote Potato Server - a free streaming server to stream all media on a PC to browsers, apps, etc☆24Jul 23, 2012Updated 13 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 6 months ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- A care package of useful bofs for red team engagments☆55Dec 6, 2024Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆40Dec 12, 2025Updated 2 months ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- ☆19Sep 17, 2025Updated 4 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 10 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Dec 26, 2025Updated last month
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 8 months ago
- ☆40Dec 24, 2025Updated last month
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago