SilentDev33 / ChromeAppBound-key-injectionLinks
Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in Program Files
☆35Updated 4 months ago
Alternatives and similar repositories for ChromeAppBound-key-injection
Users that are interested in ChromeAppBound-key-injection are comparing it to the libraries listed below
Sorting:
- Decrypting yandex browser passwords☆24Updated 4 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆22Updated 3 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆41Updated 3 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆20Updated 4 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆50Updated 3 months ago
- Troll TaskManager, and play with it .☆25Updated 3 weeks ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆75Updated 2 months ago
- A mutliple tactics to execute shellcode in go :}☆21Updated 4 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆21Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆49Updated 3 months ago
- ☆45Updated 11 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Windows C++ Implant for Exploration C2☆39Updated this week
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆60Updated 3 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆22Updated 4 months ago
- The best powershell obfuscator ever made☆111Updated last month
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆26Updated 8 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆22Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 3 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆65Updated 2 weeks ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 4 months ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆41Updated 3 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆80Updated 4 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated 9 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 4 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆49Updated last year