OmerYa / ROP-From-Zero-to-Nation-State-In-25-Minutes
Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)
☆15Updated 4 years ago
Alternatives and similar repositories for ROP-From-Zero-to-Nation-State-In-25-Minutes:
Users that are interested in ROP-From-Zero-to-Nation-State-In-25-Minutes are comparing it to the libraries listed below
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- ☆24Updated 3 years ago
- ☆15Updated last year
- A collection of scripts used to support an OffSecOps pipeline.☆14Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- ☆10Updated 5 years ago
- ☆46Updated 3 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆15Updated 3 years ago
- ☆14Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- really ?☆12Updated 10 months ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- ☆18Updated 3 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 7 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆51Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated last month
- AMSI detection PoC☆30Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- ☆11Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago