Pica4x6 / SecurePreferencesFile
☆32Updated 3 years ago
Alternatives and similar repositories for SecurePreferencesFile:
Users that are interested in SecurePreferencesFile are comparing it to the libraries listed below
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- Change hash for a signed pe☆16Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 10 months ago
- ☆53Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆46Updated last year
- ☆27Updated 3 months ago
- ☆21Updated 11 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆22Updated 2 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- ☆36Updated 10 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated this week
- ☆28Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- ADSI based SA tool☆17Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago
- ☆40Updated 2 years ago
- ☆62Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- API Hammering with C++20☆46Updated 2 years ago