anvilsecure / nosymonkeyLinks
API hooking and code injection made easy!
☆39Updated last year
Alternatives and similar repositories for nosymonkey
Users that are interested in nosymonkey are comparing it to the libraries listed below
Sorting:
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 3 months ago
- ☆48Updated last year
- Tool for obtaining information about PPL processes☆17Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 3 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago
- single-threaded event driven sleep obfuscation poc for linux☆34Updated last month
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆33Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A PoC for achieving persistence via push notifications on Windows☆46Updated 2 years ago
- ☆18Updated 6 months ago
- dump Chrome cookies remotely with atexec and CDP☆67Updated 11 months ago
- ECC Public Key Cryptography☆38Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- ☆16Updated last year
- ☆18Updated 9 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- ☆55Updated 9 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- ☆59Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆84Updated last week
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated 3 weeks ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago