andreiverse / WindowsPotatoesLinks
A list of windows potatoes!
☆26Updated 3 years ago
Alternatives and similar repositories for WindowsPotatoes
Users that are interested in WindowsPotatoes are comparing it to the libraries listed below
Sorting:
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- D/Invoke implementation in Nim☆103Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- ☆55Updated 4 years ago
- It's pointy and it hurts!☆126Updated 3 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 3 years ago
- maldev obviously☆28Updated 7 months ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- cobalt strike tools☆31Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆68Updated 3 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- Remove API hooks from a Beacon process.☆77Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆60Updated 3 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- ☆112Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users