RixedLabs / IDLE-Abuse
A method to execute shellcode using RegisterWaitForInputIdle API.
☆52Updated last year
Alternatives and similar repositories for IDLE-Abuse:
Users that are interested in IDLE-Abuse are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- ☆43Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- ☆20Updated 9 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆21Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆47Updated last year
- Sliver agent rewritten in C++☆44Updated 6 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- ☆24Updated 3 years ago
- ☆36Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆39Updated 4 years ago
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- API Hammering with C++20☆45Updated 2 years ago
- ☆47Updated 2 years ago
- ☆59Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated 11 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year