RistBS / ContextMenuHijack
Execute a payload at each right click on a file/folder in the explorer menu for persistence
☆172Updated last year
Alternatives and similar repositories for ContextMenuHijack:
Users that are interested in ContextMenuHijack are comparing it to the libraries listed below
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆171Updated 2 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆187Updated 8 months ago
- Load a dynamic library from memory by modifying the native Windows loader☆207Updated last month
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆167Updated last year
- BOF combination of KillDefender and Backstab☆163Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆135Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆136Updated 2 years ago
- a library that automates some clean syscalls to make it easier to implement☆84Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆143Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆164Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆133Updated 2 years ago
- ☆134Updated 2 years ago
- ☆112Updated 2 years ago
- You shall pass☆255Updated 2 years ago
- TypeLib persistence technique☆107Updated 3 months ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- ☆134Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- The code is a pingback to the Dark Vortex blog:☆170Updated 2 years ago
- A nice process dumping tool☆78Updated 2 years ago
- Exploring in-memory execution of .NET☆137Updated 2 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆265Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆229Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆209Updated 2 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆75Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆224Updated last year
- ☆115Updated last year
- ☆138Updated last year