ayoul3 / reflect-peLinks
Reflectively load PE
☆105Updated 5 years ago
Alternatives and similar repositories for reflect-pe
Users that are interested in reflect-pe are comparing it to the libraries listed below
Sorting:
- Reflective DLL loading of your favorite Golang program☆173Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago
- Go implementation of the Heaven's Gate technique☆101Updated 4 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 4 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- PoC to interact with local/remote registry hives through WMI☆87Updated 5 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆77Updated last year
- Extension of SMBLibrary for RPC calls☆35Updated last year
- CallBack-Techniques for Shellcode execution ported to Nim☆61Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated 2 years ago
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆46Updated 2 years ago
- ☆48Updated this week
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- Research project for understanding how Mimikatz work and become better at C☆124Updated 4 years ago
- ☆38Updated 5 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- ☆70Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆223Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- ☆50Updated 5 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Updated 5 years ago
- ☆98Updated 4 years ago