SolomonSklash / SyscallPOCLinks
Shellcode injection POC using syscalls.
☆116Updated 5 years ago
Alternatives and similar repositories for SyscallPOC
Users that are interested in SyscallPOC are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOF Files with Nim!☆85Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- My CobaltStrike BOFS☆165Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- Research project for understanding how Mimikatz work and become better at C☆124Updated 3 years ago
- PoC for UUID shellcode execution using DInvoke☆153Updated 4 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆190Updated 3 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆153Updated 4 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆109Updated 5 years ago
- Pass the Hash to a named pipe for token Impersonation☆144Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆68Updated 6 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆109Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆288Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- Shellcode injector using direct syscalls☆120Updated 4 years ago
- C++ WinRM API via Reflective DLL☆146Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- Exploring in-memory execution of .NET☆139Updated 3 years ago
- nuke that event log using some epic dinvoke fu☆118Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- ☆113Updated 5 years ago