aahmad097 / Test004
Persistence via Shell Extensions
☆62Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Test004
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 11 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆95Updated last year
- A work in progress BOF/COFF loader in Rust☆45Updated last year
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- ☆51Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated 9 months ago
- Sliver agent rewritten in C++☆39Updated 2 months ago
- Sleep Obfuscation☆41Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆66Updated 2 years ago
- ☆58Updated 2 years ago
- stack spoofing☆53Updated this week
- BYOVD collection☆20Updated 8 months ago
- ☆44Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- Beacon Object Files (not Buffer Overflows)☆51Updated last year
- ☆37Updated 10 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆51Updated last year
- ☆34Updated last year
- ☆38Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆78Updated last year