bryanroma / HollowSVCLinks
Windows Service with the implementation of the Process hollowing technique to run shellcode
☆14Updated last year
Alternatives and similar repositories for HollowSVC
Users that are interested in HollowSVC are comparing it to the libraries listed below
Sorting:
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆24Updated last week
- BypassCredGuard CS BOF☆42Updated 5 months ago
- Beacon Object Files.☆35Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 9 months ago
- A Simple PoC☆21Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- CVE-2024-40711-exp☆42Updated 8 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆45Updated 2 years ago
- Sliver agent rewritten in C++☆44Updated 9 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last month
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆51Updated 4 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆16Updated 2 weeks ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- ☆13Updated 2 years ago
- Library of BOFs to interact with SQL servers☆22Updated 2 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- ☆39Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆34Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆33Updated 3 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆28Updated 2 years ago