b4rth0v5k1 / Night_WalkerLinks
☆78Updated 2 years ago
Alternatives and similar repositories for Night_Walker
Users that are interested in Night_Walker are comparing it to the libraries listed below
Sorting:
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Do some DLL SideLoading magic☆87Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- ☆109Updated 7 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆120Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆80Updated 7 months ago
- A BOF to enumerate system process, their protection levels, and more.☆120Updated 10 months ago
- ☆122Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆93Updated 3 months ago
- Lateral Movement via the .NET Profiler☆83Updated 10 months ago
- ☆113Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- ☆151Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆71Updated 5 months ago
- C# havoc implant☆101Updated 2 years ago
- ☆124Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated 6 months ago
- Basic interactive Windows kernel offensive toolkit written in C☆131Updated 3 weeks ago
- ☆135Updated 8 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆113Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Impersonate Tokens using only NTAPI functions☆80Updated 6 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆122Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 2 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- Shellcode loader☆94Updated 10 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago