Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueApcThreadEx2) for stealthy execution. Minimal permissions, no allocations/protection changes
☆70Feb 17, 2026Updated 3 months ago
Alternatives and similar repositories for FrankensteinAPCInjection
Users that are interested in FrankensteinAPCInjection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆81Apr 11, 2026Updated last month
- Notion C2 Profile for Mythic☆46Apr 30, 2026Updated 2 weeks ago
- ClickForClickOnce - Generate configurable clickonce payloads☆94Apr 17, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆84Nov 6, 2025Updated 6 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆53Nov 2, 2025Updated 6 months ago
- ExportHider: Generating Export Table during Runtime to Hide the Exported Functions from the DLL File.☆33Apr 12, 2026Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆46Jan 14, 2025Updated last year
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 25, 2026Updated 3 weeks ago
- ☆47Dec 5, 2023Updated 2 years ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 5 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 9 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆82Apr 8, 2026Updated last month
- test☆104Apr 25, 2026Updated 3 weeks ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 6 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆134Oct 4, 2024Updated last year
- ☆109Aug 21, 2024Updated last year
- Bof of RegPwn by MDSec☆121Mar 15, 2026Updated 2 months ago
- A headless MCP server for IDA Pro and Ghidra☆85May 5, 2026Updated 2 weeks ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆295Feb 21, 2026Updated 2 months ago
- TLS fingerprint emulation upstream proxy replay any ClientHello☆47Apr 6, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ForsHops☆154Mar 25, 2025Updated last year
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28May 4, 2026Updated 2 weeks ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools.☆203Mar 4, 2026Updated 2 months ago
- adws enumeration bof☆172Feb 16, 2026Updated 3 months ago
- exchange接口爆破|邮箱爆破☆20Sep 19, 2024Updated last year
- Sleep obfuscation☆276Dec 13, 2024Updated last year
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆45Nov 4, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- ASPX Web Shell with COFF Loader☆129Mar 10, 2026Updated 2 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 10 months ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆22Updated this week
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆129Mar 27, 2026Updated last month
- ☆21Jun 9, 2023Updated 2 years ago
- Open KLara Project☆36Feb 12, 2026Updated 3 months ago