anvilsecure / nosymonkeyLinks
API hooking and code injection made easy!
☆39Updated 2 years ago
Alternatives and similar repositories for nosymonkey
Users that are interested in nosymonkey are comparing it to the libraries listed below
Sorting:
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 5 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- IAT Unhooking proof-of-concept☆30Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- dump Chrome cookies remotely with atexec and CDP☆67Updated last year
- ☆58Updated 11 months ago
- ☆60Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆33Updated 3 years ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- ☆28Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆15Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- ☆48Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Beacon Object Files used for Cobalt Strike☆18Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- ECC Public Key Cryptography☆39Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆32Updated 2 years ago