almounah / superdeye
Indirect Syscall with TartarusGate Approach in Go
☆91Updated last month
Alternatives and similar repositories for superdeye:
Users that are interested in superdeye are comparing it to the libraries listed below
- ☆85Updated 8 months ago
- Just another C2 Redirector using CloudFlare.☆82Updated 8 months ago
- ☆105Updated last month
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆212Updated last month
- ☆92Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- Simple C# Redirector☆78Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆112Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 5 months ago
- A Mythic Agent written in PIC C.☆167Updated last week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 6 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆123Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆157Updated last month
- ☆136Updated 5 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆55Updated last year
- ☆121Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆101Updated last month
- Stage 0☆140Updated last month
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆76Updated 3 months ago
- AzureAD beacon object files☆105Updated last month
- ☆120Updated last year
- A collection of position independent coding resources☆64Updated this week
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆122Updated 5 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆68Updated 5 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆151Updated 3 weeks ago
- A BOF to enumerate system process, their protection levels, and more.☆111Updated last month
- Find DLLs with RWX section☆76Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆84Updated 7 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆111Updated 4 months ago