andreiverse / WindowsPotatoesLinks
A list of windows potatoes!
☆26Updated 3 years ago
Alternatives and similar repositories for WindowsPotatoes
Users that are interested in WindowsPotatoes are comparing it to the libraries listed below
Sorting:
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- Remove API hooks from a Beacon process.☆76Updated 3 years ago
- D/Invoke implementation in Nim☆103Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- ☆101Updated 4 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- cobalt strike tools☆31Updated 4 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Updated 4 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- ☆42Updated 4 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- ☆55Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Updated 3 years ago
- How to spoof the command line when spawning a new process from C#.☆110Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Evasive Process Hollowing Techniques☆142Updated 5 years ago
- Experiment on reproducing Obfuscate & Sleep☆160Updated 4 years ago
- ☆60Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Updated 4 years ago
- It's pointy and it hurts!☆126Updated 3 years ago
- ☆112Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago