WesleyWong420 / Build-Your-Own-LOLBinsLinks
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆31Updated 2 years ago
Alternatives and similar repositories for Build-Your-Own-LOLBins
Users that are interested in Build-Your-Own-LOLBins are comparing it to the libraries listed below
Sorting:
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆84Updated last year
- ☆49Updated 2 years ago
- ☆38Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- ☆77Updated last year
- ☆80Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆61Updated 2 years ago
- ☆68Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- ☆76Updated 3 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- ☆43Updated last year
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Windows internals and exploitation tricks☆108Updated last month
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Updated 2 years ago
- ☆107Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- Do some DLL SideLoading magic☆89Updated 2 years ago