WesleyWong420 / Build-Your-Own-LOLBins
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆22Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Build-Your-Own-LOLBins
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- ☆25Updated last year
- Docker container for running CobaltStrike 4.10☆33Updated 2 months ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- ☆17Updated last year
- ☆58Updated 11 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- A Mythic Agent written in PIC C.☆68Updated this week
- ☆49Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆80Updated 9 months ago
- ☆37Updated 3 weeks ago
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆46Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆51Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- A small red team course☆32Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- ☆43Updated 4 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated 9 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆45Updated last year