caueb / MockingjayLinks
Mockingjay process self injection POC
☆42Updated 2 years ago
Alternatives and similar repositories for Mockingjay
Users that are interested in Mockingjay are comparing it to the libraries listed below
Sorting:
- Find DLLs with RWX section☆80Updated 2 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆117Updated 4 months ago
- ☆109Updated 9 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆134Updated 3 months ago
- Lateral Movement via the .NET Profiler☆84Updated last year
- ☆126Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆31Updated 7 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Good CLR Host with Native patchless AMSI Bypass☆96Updated 7 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Updated 8 months ago
- A Mythic agent for Windows written in C☆140Updated last week
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆183Updated 3 weeks ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- ☆159Updated 11 months ago
- ☆53Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- A hoontr must hoont☆101Updated 3 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Updated 3 weeks ago
- ☆137Updated 3 weeks ago
- Internal Monologue BOF☆79Updated 11 months ago
- Adversary Emulation Framework☆126Updated 4 months ago
- ☆122Updated 2 years ago
- A small How-To on creating your own weaponized WSL file☆119Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 7 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 7 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 6 months ago
- Create Anti-Copy DRM Malware☆69Updated last year