ZephrFish / HelloJackHunterLinks
Research into WinSxS binaries and finding hijackable paths
☆30Updated 2 months ago
Alternatives and similar repositories for HelloJackHunter
Users that are interested in HelloJackHunter are comparing it to the libraries listed below
Sorting:
- ☆109Updated 11 months ago
- ☆126Updated last year
- ☆92Updated last year
- ☆53Updated 4 months ago
- ☆100Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆35Updated last year
- Lateral movement with DCOM DLL hijacking☆176Updated 7 months ago
- ☆100Updated 2 years ago
- Threadless shellcode injection tool☆68Updated last year
- I have documented all of the AMSI patches that I learned till now☆75Updated 3 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166Updated 8 months ago
- A BOF to enumerate system process, their protection levels, and more.☆124Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆63Updated 10 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Updated 10 months ago
- Bypassing Amsi using LdrLoadDll☆47Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated 11 months ago
- A process injection technique using only thread context manipulation☆40Updated 2 years ago
- Create Anti-Copy DRM Malware☆71Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Updated last year
- ☆122Updated 2 years ago
- remote process injections using pool party techniques☆70Updated 7 months ago
- ☆123Updated last year
- ☆86Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Updated 2 years ago