bryanroma / HollowSVC
Windows Service with the implementation of the Process hollowing technique to run shellcode
☆14Updated last year
Alternatives and similar repositories for HollowSVC:
Users that are interested in HollowSVC are comparing it to the libraries listed below
- A Simple PoC☆20Updated 8 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- Beacon Object Files.☆35Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated 9 months ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆30Updated 7 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 5 months ago
- BypassCredGuard CS BOF☆32Updated 3 weeks ago
- Beacon Debugger☆39Updated 3 months ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆18Updated 8 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆32Updated 10 months ago
- Sliver agent rewritten in C++☆44Updated 5 months ago
- ☆13Updated 2 years ago
- DLL Unhooking☆12Updated 3 years ago
- Modified Spool Sample for SEImpersonate Privilege Escalation.☆13Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆50Updated 3 years ago
- AD Pentest Cheatsheet by BlackWasp☆20Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- CVE-2024-40711-exp☆38Updated 4 months ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆47Updated 3 months ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Updated last year
- Collection of self-made Red Team tools that have come in handy☆11Updated 5 months ago
- ☆63Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆15Updated last year
- x64 version☆30Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆33Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆14Updated 5 months ago
- A simple BOF (Beacon Object File) to search files in the system☆12Updated last year