brosck / L1LKillerLinks
「⚠️」Performing a BYOVD on the truesight.sys driver
☆39Updated 8 months ago
Alternatives and similar repositories for L1LKiller
Users that are interested in L1LKiller are comparing it to the libraries listed below
Sorting:
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆113Updated 7 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆75Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆186Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- A Mythic agent for Windows written in C☆131Updated 2 weeks ago
- ☆116Updated 4 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- Stage 0☆163Updated 7 months ago
- ☆144Updated 9 months ago
- A python script that automates a C2 Profile build☆43Updated 4 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆116Updated last week
- A small How-To on creating your own weaponized WSL file☆83Updated 2 weeks ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆78Updated 5 months ago
- Collection of red team techniques.☆58Updated 3 months ago
- Impersonate Tokens using only NTAPI functions☆79Updated 4 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆149Updated last week
- Sleep obfuscation☆230Updated 7 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 5 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆100Updated 4 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆171Updated 4 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆85Updated 3 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆152Updated 2 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- Shellcode loader☆91Updated 8 months ago