Tylous / Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
☆74Updated 2 years ago
Alternatives and similar repositories for Mangle:
Users that are interested in Mangle are comparing it to the libraries listed below
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆150Updated 2 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆184Updated 4 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆106Updated last year
- ☆146Updated 8 months ago
- Adversary Emulation Framework☆92Updated 8 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆216Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆196Updated last month
- Havoc C2 profile generator☆74Updated 5 months ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆133Updated this week
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated last month
- C or BOF file to extract WebKit master key to decrypt user cookie☆192Updated 11 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆291Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- ☆181Updated last year
- My implementation of the GIUDA project in C++☆181Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆108Updated this week
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆127Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆158Updated 10 months ago
- Shaco is a linux agent for havoc☆157Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- ☆170Updated 4 months ago
- TeamServer and Client of Exploration Command and Control Framework☆117Updated last week
- The Official Sliver Armory☆98Updated 2 months ago
- A Mythic agent for Windows written in C☆104Updated this week
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- ☆162Updated 8 months ago
- AzureAD beacon object files☆115Updated 3 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 8 months ago