Wra7h / SingleDose
Generate Shellcode Loaders & Injects
☆155Updated last year
Alternatives and similar repositories for SingleDose:
Users that are interested in SingleDose are comparing it to the libraries listed below
- An App Domain Manager Injection DLL PoC on steroids☆167Updated last year
- Patch AMSI and ETW☆236Updated 10 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆319Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆176Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Execute shellcode files with rundll32☆195Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆172Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆82Updated last week
- ☆149Updated last year
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆186Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆302Updated last year
- ☆181Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆217Updated last year
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆104Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆286Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆158Updated 10 months ago
- You shall pass☆256Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆183Updated last year
- Do some DLL SideLoading magic☆80Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆183Updated 2 weeks ago
- (Demo) 3rd party agent for Havoc☆137Updated last year
- Generic PE loader for fast prototyping evasion techniques☆229Updated 8 months ago
- Evasive Golang Loader☆129Updated 8 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆319Updated 2 years ago
- ☆154Updated 2 years ago