bryanroma / HollowSVC
Windows Service with the implementation of the Process hollowing technique to run shellcode
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for HollowSVC
- old postex for grabbing a krbtgs for my current user☆28Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆41Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆43Updated last year
- A Simple PoC☆19Updated 6 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- DLL Unhooking☆12Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆31Updated 8 months ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- Sliver agent rewritten in C++☆39Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated 10 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆30Updated 6 months ago
- Tool That Loads and Executes a Beacon Object File With Arguments☆10Updated this week
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆28Updated 4 months ago
- A nim implementation of sRDI☆16Updated last year
- A simple BOF (Beacon Object File) to search files in the system☆11Updated 11 months ago
- Beacon Object Files.☆31Updated 8 months ago
- AV/EDR killer using BYOVD technique☆21Updated last month
- Fork & modify of Wireguard's Memmod☆31Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆23Updated 2 months ago
- Beacon Debugger☆36Updated 3 weeks ago
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆39Updated 2 years ago
- ☆38Updated last year
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- ☆15Updated last year
- ☆27Updated last year