audibleblink / dummyDLLLinks
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
☆41Updated 2 years ago
Alternatives and similar repositories for dummyDLL
Users that are interested in dummyDLL are comparing it to the libraries listed below
Sorting:
- Go implementation of the Heaven's Gate technique☆98Updated 4 years ago
- Reflectively load PE☆103Updated 5 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- ☆18Updated 3 years ago
- ☆52Updated 5 years ago
- ☆45Updated 3 months ago
- RDI implementation in Nim☆64Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆113Updated 4 years ago
- ☆38Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 3 years ago
- Beacon Object Files.☆37Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- HookDetection☆45Updated 3 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- ☆50Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- inject or convert shellcode to PE☆40Updated 5 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- MacOS C2 Framework☆84Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 3 years ago
- Kernel file/process/object tool☆67Updated 4 years ago
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆48Updated 2 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Updated 4 years ago
- Research project for understanding how Mimikatz work and become better at C☆124Updated 3 years ago