Techryptic / Pokemon-Shellcode-Loader
Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.
☆117Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Pokemon-Shellcode-Loader
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆350Updated last year
- ☆238Updated last year
- CobaltStrike beacon in rust☆177Updated 3 months ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆143Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆365Updated last year
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆184Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago
- Bypass Detection By Randomising ROR13 API Hashes☆133Updated 2 years ago
- Misc TaskScheduler Plays☆224Updated 2 years ago
- An implementation and proof-of-concept of Process Forking.☆218Updated 2 years ago
- Windows LPE☆104Updated 5 months ago
- CobaltStrike 4.0 - 4.5 Patch☆173Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆110Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆140Updated 3 months ago
- C2 redirector base on caddy☆196Updated 5 months ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆87Updated last year
- Another shellcode runner 🦀 🐚☆146Updated 3 years ago
- A Go implementation of Cobalt Strike style BOF/COFF loaders.☆179Updated 2 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆201Updated last year
- not a reverse-engineered version of the Cobalt Strike Beacon☆336Updated 7 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆69Updated 8 months ago
- Credential Guard Bypass Via Patching Wdigest Memory☆310Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆151Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆164Updated 8 months ago
- ☆90Updated last year
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- ☆47Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆134Updated 2 years ago