WesleyWong420 / Build-Your-Own-LOLBinsLinks
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆28Updated 2 years ago
Alternatives and similar repositories for Build-Your-Own-LOLBins
Users that are interested in Build-Your-Own-LOLBins are comparing it to the libraries listed below
Sorting:
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- ☆47Updated last year
- ☆39Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆85Updated 3 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- ☆74Updated 3 years ago
- ☆69Updated 2 years ago
- Windows internals and exploitation tricks☆105Updated 4 months ago
- ☆77Updated last year
- ☆41Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆90Updated 3 years ago
- Finding secrets in kernel and user memory☆115Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- ☆80Updated last year
- IAT Unhooking proof-of-concept☆32Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Python module for running BOFs☆74Updated 2 years ago
- ☆45Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ☆69Updated last year
- ☆120Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago