Real-Cryillic / Sarla
It's what all the kids are talking about
☆12Updated 2 years ago
Alternatives and similar repositories for Sarla
Users that are interested in Sarla are comparing it to the libraries listed below
Sorting:
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆19Updated 5 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆26Updated 3 months ago
- idk man this was the default github name☆35Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- A work in progress BOF/COFF loader in Rust☆48Updated 2 years ago
- ☆30Updated last month
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- ☆48Updated last year
- BOF for C2 framework☆41Updated 6 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- An In-memory Embedding of CPython☆28Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 months ago
- various methods of making API calls☆17Updated 3 months ago
- Proxy function calls through the thread pool with ease☆25Updated 2 months ago
- Classic Bofa adapted to CobaltStrike.☆11Updated 2 years ago
- Python module for running BOFs☆70Updated last year
- ☆34Updated last month
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Bunch of BOF files☆31Updated 4 months ago
- A lexer and parser for Sleep☆19Updated this week
- Dump Teams conversations☆19Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago