boku7 / DarkWidowLinks
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
☆14Updated last year
Alternatives and similar repositories for DarkWidow
Users that are interested in DarkWidow are comparing it to the libraries listed below
Sorting:
- Rewrite to fit my needs☆28Updated 11 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆30Updated 2 weeks ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated 3 weeks ago
- Click Once + App Domain☆62Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆53Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- ☆26Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆73Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 5 months ago
- HTML smuggling is not an evil, it can be useful☆13Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆25Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- ☆51Updated last month
- Sniffing files generator☆59Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- ☆47Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆23Updated 7 months ago
- ☆31Updated 10 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆94Updated 8 months ago
- ☆44Updated 2 weeks ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆19Updated last year
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- BOF for C2 framework☆41Updated 8 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- PoC XLL builder in Python/Nim☆46Updated 2 years ago