anvilsecure / nosymonkeyLinks
API hooking and code injection made easy!
☆40Updated 2 years ago
Alternatives and similar repositories for nosymonkey
Users that are interested in nosymonkey are comparing it to the libraries listed below
Sorting:
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆61Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- ☆49Updated 2 years ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- dump Chrome cookies remotely with atexec and CDP☆67Updated last year
- ☆18Updated 11 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 weeks ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A collection of PoCs for different injection techniques on Windows!☆47Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 weeks ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- EvtPsst☆55Updated 2 years ago
- ☆17Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ☆59Updated last year
- HTML Smuggling with Web Assembly☆65Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago