boku7 / DarkWidowLinks
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
☆14Updated last year
Alternatives and similar repositories for DarkWidow
Users that are interested in DarkWidow are comparing it to the libraries listed below
Sorting:
- Rewrite to fit my needs☆30Updated last year
- BOF for C2 framework☆43Updated 9 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago
- Proxy function calls through the thread pool with ease☆29Updated 6 months ago
- ☆26Updated 6 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆39Updated 2 months ago
- Repository to gather the .NET malware I will be developing☆18Updated 5 months ago
- Click Once + App Domain☆63Updated last year
- Post-Ex BOF tooling for Hannibal☆24Updated 9 months ago
- Bunch of BOF files☆34Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆26Updated 6 months ago
- RPC to WebClient startup☆46Updated last week
- Local SYSTEM auth trigger for relaying - X☆136Updated last month
- Sniffing files generator☆59Updated 6 months ago
- Internal Monologue BOF☆20Updated 8 months ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆54Updated 4 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆65Updated last year
- HTML smuggling is not an evil, it can be useful☆13Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 8 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆49Updated 3 months ago
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- ☆47Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆26Updated 3 months ago
- ☆53Updated 2 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆65Updated last month
- ☆31Updated last year