Offensive-Panda / WPM-MAJIC-ENTRY-POINT-INJECTIONLinks
This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.
☆16Updated 8 months ago
Alternatives and similar repositories for WPM-MAJIC-ENTRY-POINT-INJECTION
Users that are interested in WPM-MAJIC-ENTRY-POINT-INJECTION are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆27Updated last year
- All my POC related to malware development☆12Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆28Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- A simple BOF that disables some logging with NtSetInformationProcess☆13Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- ☆19Updated 7 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 5 months ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated last year
- A pure C version of SymProcAddress☆28Updated last year
- Self Delete DLL☆23Updated last year
- ☆23Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- ☆19Updated 2 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- Repository to gather the BOF files I will be developing☆10Updated 9 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆14Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 9 months ago
- ☆26Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆16Updated 3 months ago