bot984397 / eepy
☆30Updated 3 weeks ago
Alternatives and similar repositories for eepy:
Users that are interested in eepy are comparing it to the libraries listed below
- Get NetNTLMv2 in Go☆12Updated 3 weeks ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆26Updated 3 months ago
- BOF for C2 framework☆41Updated 6 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 3 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆21Updated last year
- macOS dylib stager☆32Updated 3 months ago
- A lexer and parser for Sleep☆19Updated this week
- ☆30Updated 5 months ago
- ☆27Updated 3 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 5 months ago
- ☆48Updated last year
- various methods of making API calls☆17Updated 3 months ago
- A work in progress BOF/COFF loader in Rust☆47Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- use python on windows with full submodule support without installation☆27Updated 3 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 10 months ago
- An In-memory Embedding of CPython☆28Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- ☆29Updated 4 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 2 months ago
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- ☆28Updated 11 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago