ayoul3 / reflect-peLinks
Reflectively load PE
☆103Updated 4 years ago
Alternatives and similar repositories for reflect-pe
Users that are interested in reflect-pe are comparing it to the libraries listed below
Sorting:
- Reflective DLL loading of your favorite Golang program☆169Updated 5 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 3 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆73Updated 10 months ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆41Updated 2 years ago
- Go implementation of the Heaven's Gate technique☆98Updated 4 years ago
- Process injection techniques written in Go.☆62Updated last year
- Demo of process injection, using Nt, direct syscall, etc.☆28Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆66Updated last year
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆125Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 2 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- ☆146Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆60Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆75Updated 2 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆86Updated 4 years ago
- Exploring in-memory execution of .NET☆137Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆21Updated 4 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆80Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated last year