almounah / superdeyeLinks
Indirect Syscall with TartarusGate Approach in Go
☆121Updated 6 months ago
Alternatives and similar repositories for superdeye
Users that are interested in superdeye are comparing it to the libraries listed below
Sorting:
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆184Updated 4 months ago
- ☆132Updated 4 months ago
- ☆90Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆163Updated last month
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆139Updated last week
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- A Mythic agent for Windows written in C☆125Updated 3 weeks ago
- ☆112Updated 4 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆129Updated last month
- Stage 0☆160Updated 6 months ago
- Execute commands in other Sessions☆89Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 8 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆152Updated 6 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆83Updated 2 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆123Updated 2 months ago
- AzureAD beacon object files☆120Updated 6 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 6 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- ☆125Updated 9 months ago
- Threadless shellcode injection tool☆65Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆107Updated last month
- A C# port from Invoke-GhostTask☆117Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆155Updated last year
- ☆137Updated last month
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Updated 9 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- ☆107Updated 7 months ago
- ☆97Updated 9 months ago