WesleyWong420 / Build-Your-Own-LOLBins
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆23Updated last year
Alternatives and similar repositories for Build-Your-Own-LOLBins:
Users that are interested in Build-Your-Own-LOLBins are comparing it to the libraries listed below
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- ☆38Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- IAT Unhooking proof-of-concept☆29Updated 9 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- ☆51Updated last month
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- A small red team course☆34Updated last year
- ☆58Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆20Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 4 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 2 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Find DLLs with RWX section☆76Updated last year
- ☆52Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- A PoC for achieving persistence via push notifications on Windows☆45Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆70Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated 10 months ago
- ☆40Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year