bryanroma / HollowSVC
Windows Service with the implementation of the Process hollowing technique to run shellcode
☆14Updated last year
Alternatives and similar repositories for HollowSVC:
Users that are interested in HollowSVC are comparing it to the libraries listed below
- A Simple PoC☆21Updated 11 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated 2 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆44Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- BypassCredGuard CS BOF☆38Updated 3 months ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆23Updated 10 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 7 months ago
- DLL Unhooking☆12Updated 4 years ago
- Sliver agent rewritten in C++☆44Updated 8 months ago
- CVE-2024-40711-exp☆41Updated 6 months ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆59Updated 2 years ago
- Some anti-sandbox techniques implemented in Golang.☆11Updated last year
- Beacon Object Files.☆35Updated last year
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- x64 version☆34Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Updated last year
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Its a coff loader ported to go( Modified by TimWhite )☆26Updated last year
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆34Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆44Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆11Updated 8 months ago
- ☆30Updated last month
- Groovy Post Exploitation☆20Updated 6 months ago