Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.
☆129Jul 29, 2022Updated 3 years ago
Alternatives and similar repositories for Pokemon-Shellcode-Loader
Users that are interested in Pokemon-Shellcode-Loader are comparing it to the libraries listed below
Sorting:
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆253Jun 25, 2023Updated 2 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆75Sep 12, 2023Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆742Jul 22, 2023Updated 2 years ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,008Jun 4, 2024Updated last year
- ☆30Nov 7, 2022Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- Sleep Obfuscation☆824Dec 3, 2023Updated 2 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆604Mar 2, 2026Updated 2 weeks ago
- ☆155Jun 18, 2024Updated last year
- TartarusGate, Bypassing EDRs☆653Jan 25, 2022Updated 4 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- ☆564Feb 22, 2024Updated 2 years ago
- POCs for Shellcode Injection via Callbacks☆411Feb 23, 2021Updated 5 years ago
- Go implementation of the self-deletion of an running executable from disk☆113Jun 6, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆662Jan 25, 2026Updated last month
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,601Jul 31, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆203Jun 7, 2023Updated 2 years ago
- ☆61Jan 9, 2023Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆135Nov 30, 2022Updated 3 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,096Jun 17, 2022Updated 3 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆175Mar 15, 2023Updated 3 years ago
- Threadless Process Injection using remote function hooking.☆810Sep 4, 2024Updated last year
- ☆511Aug 14, 2022Updated 3 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,259May 8, 2024Updated last year
- ☆245Sep 19, 2023Updated 2 years ago
- Various ways to execute shellcode☆508Mar 13, 2024Updated 2 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆186Oct 3, 2021Updated 4 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆325Nov 17, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,372Oct 27, 2023Updated 2 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆373Feb 27, 2023Updated 3 years ago