SaadAhla / Anti-SandboxLinks
☆46Updated 3 weeks ago
Alternatives and similar repositories for Anti-Sandbox
Users that are interested in Anti-Sandbox are comparing it to the libraries listed below
Sorting:
- Go Shellcode Loader to be Integrated in Exploration C2☆28Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 7 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 7 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆53Updated 3 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 7 months ago
- Execute shellcode via Bluetooth device authentication☆40Updated 10 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆59Updated 10 months ago
- Dump Linux keyrings☆23Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆107Updated last week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆83Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆62Updated 11 months ago
- dump Chrome cookies remotely with atexec and CDP☆67Updated last year
- ☆59Updated last year
- Agent for AdaptixC2 containing lateral movement capabilities ( WMI, SCM, WinRM, DCOM ), bof/dotnet/shellcode in memory executions, postex…☆95Updated last week
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 7 months ago
- ☆54Updated 6 months ago
- ☆74Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Updated 4 months ago
- remote process injections using pool party techniques☆69Updated 5 months ago
- ☆56Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 5 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆116Updated 2 weeks ago
- demo unhooking functions in ntdll☆28Updated 5 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 10 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆38Updated 3 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Updated 5 months ago
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago