Remote DLL Injection with Timer-based Shellcode Execution
☆206Jul 18, 2025Updated 9 months ago
Alternatives and similar repositories for Remote-DLL-Injection-with-Timer-based-Shellcode-Execution
Users that are interested in Remote-DLL-Injection-with-Timer-based-Shellcode-Execution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆275Jun 18, 2025Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 8 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 9 months ago
- ☆164May 5, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆83Aug 3, 2025Updated 8 months ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆217Aug 21, 2025Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆196Feb 6, 2025Updated last year
- ☆50Dec 5, 2025Updated 4 months ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 10 months ago
- Weaponize DLL hijacking easily. Backdoor any function in any DLL.☆741Aug 26, 2025Updated 8 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆224Jun 4, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated 3 weeks ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 7 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆267Sep 23, 2025Updated 7 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 4 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- BOF to run PE in Cobalt Strike Beacon without console creation☆198Nov 23, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 9 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 7 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- General Purpose OpSec Server☆114Mar 13, 2026Updated last month
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆551May 9, 2025Updated 11 months ago
- A Reflective Loader for macOS☆149Jul 20, 2025Updated 9 months ago
- Windows remote execution multitool☆792Mar 25, 2026Updated last month
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AppLocker-Based EDR Neutralization☆335Dec 19, 2025Updated 4 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆218Mar 7, 2026Updated last month
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 8 months ago
- Shellcode loader☆106Nov 24, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year