RedCursorSecurityConsulting / NTFSCopy
NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.
☆27Updated 3 years ago
Alternatives and similar repositories for NTFSCopy:
Users that are interested in NTFSCopy are comparing it to the libraries listed below
- ☆77Updated last year
- C# Tool to interact with MS Exchange based on MS docs☆99Updated 2 years ago
- ☆37Updated 2 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- Indirect NT syscalls LSASS dumper.☆39Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- HookDetection☆45Updated 3 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- ☆39Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Halos Gate-based NTAPI Unhooker☆50Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Sleep Obfuscation☆43Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆63Updated last year
- ☆42Updated last year
- A care package of useful bofs for red team engagments☆54Updated 2 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆17Updated last year
- ☆52Updated last month
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆51Updated 2 years ago
- ☆81Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year