capt-meelo / laZzzyLinks
laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
☆490Updated 2 years ago
Alternatives and similar repositories for laZzzy
Users that are interested in laZzzy are comparing it to the libraries listed below
Sorting:
- Cobalt Strike UDRL for memory scanner evasion.☆971Updated last year
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆475Updated 2 years ago
- TartarusGate, Bypassing EDRs☆615Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆698Updated 2 years ago
- PIC lsass dumper using cloned handles☆593Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆657Updated 2 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆463Updated last year
- A BOF that runs unmanaged PEs inline☆650Updated 10 months ago
- ☆553Updated last year
- Command and Control Framework written in C#☆417Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆643Updated last month
- UDRL for CS☆432Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆433Updated last year
- Aims to identify sleeping beacons☆624Updated 9 months ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Updated 3 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆576Updated 8 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆523Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆507Updated last year
- Various ways to execute shellcode☆498Updated last year
- ☆577Updated last month
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆530Updated 3 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆491Updated last year
- Collection of Beacon Object Files☆610Updated 2 years ago
- Various Cobalt Strike BOFs☆688Updated 2 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆314Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- COM Hijacking VOODOO☆317Updated 6 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆307Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆380Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆496Updated 2 years ago