Sh0ckFR / API-HashingLinks
A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++
☆37Updated last year
Alternatives and similar repositories for API-Hashing
Users that are interested in API-Hashing are comparing it to the libraries listed below
Sorting:
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Updated 2 years ago
- SAM Dumping in C#☆54Updated 3 weeks ago
- ☆29Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 2 weeks ago
- ☆18Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- Beacon Object Files (not Buffer Overflows)☆57Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆44Updated last year
- ☆47Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 2 weeks ago
- ☆24Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 9 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆30Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Updated last year
- A care package of useful bofs for red team engagments☆55Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆30Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆16Updated 3 years ago
- ☆29Updated last year
- ☆46Updated 2 weeks ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 3 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆34Updated last year
- ☆83Updated last year