Sh0ckFR / API-HashingLinks
A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++
☆37Updated last year
Alternatives and similar repositories for API-Hashing
Users that are interested in API-Hashing are comparing it to the libraries listed below
Sorting:
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆28Updated 2 years ago
- ☆29Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- ☆54Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- BYOVD collection☆23Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆30Updated 3 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- ☆26Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- A VSCode plugin to assist with BOF development.☆37Updated 10 months ago
- ☆26Updated 7 months ago
- ☆40Updated 2 years ago
- ☆43Updated last year
- ☆29Updated 2 years ago
- Remotely dump NT hashes through Windows Crash dumps☆27Updated 7 months ago
- SAM Dumping in C#☆48Updated 5 months ago
- Sliver agent rewritten in C++☆44Updated 9 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 3 months ago
- ☆38Updated 2 weeks ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- ☆48Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆95Updated last year
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆67Updated 2 months ago