andreiverse / WindowsPotatoesLinks
A list of windows potatoes!
☆26Updated 3 years ago
Alternatives and similar repositories for WindowsPotatoes
Users that are interested in WindowsPotatoes are comparing it to the libraries listed below
Sorting:
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- D/Invoke implementation in Nim☆103Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- Remove API hooks from a Beacon process.☆76Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- ☆55Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆110Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Updated 4 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- ☆61Updated 4 years ago
- cobalt strike tools☆31Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆154Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 3 years ago
- ☆26Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Updated 2 years ago