b4rth0v5k1 / Night_WalkerLinks
☆77Updated last year
Alternatives and similar repositories for Night_Walker
Users that are interested in Night_Walker are comparing it to the libraries listed below
Sorting:
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- ☆111Updated 7 months ago
- ☆124Updated last year
- ☆107Updated 5 months ago
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Mockingjay process self injection POC☆38Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated last week
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆73Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆66Updated 6 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆85Updated last week
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- ☆82Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆68Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Create Anti-Copy DRM Malware☆59Updated 10 months ago
- ☆132Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 3 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 6 months ago
- ☆152Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆47Updated 2 months ago