Teach2Breach / rekkoexLinks
☆17Updated last year
Alternatives and similar repositories for rekkoex
Users that are interested in rekkoex are comparing it to the libraries listed below
Sorting:
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Updated 9 months ago
- Beacon Object File (BOF) Template☆60Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆60Updated 9 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 6 months ago
- ☆22Updated 10 months ago
- ☆100Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Arsenal of modules to beacon postex formats like BOF/Shellcode including: dotnet in memory execution, lateral moviment (scm, winrm, dcom,…☆91Updated last month
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 11 months ago
- BypassCredGuard CS BOF☆48Updated 11 months ago
- demo unhooking functions in ntdll☆28Updated 5 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Updated last month
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆38Updated 4 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆31Updated last year
- Sliver agent rewritten in C++☆49Updated last year
- Threadless shellcode injection tool☆67Updated last year
- converts sRDI compatible dlls to shellcode☆33Updated 11 months ago
- ☆33Updated 9 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆123Updated 3 weeks ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆63Updated 10 months ago
- ☆73Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated 2 years ago
- remote process injections using pool party techniques☆69Updated 6 months ago
- A process injection technique using only thread context manipulation☆39Updated 2 years ago
- A basic C2 framework written in C☆60Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago