caueb / Mockingjay
Mockingjay process self injection POC
☆14Updated last year
Related projects: ⓘ
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- ☆99Updated 2 weeks ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆147Updated 10 months ago
- Simple BOF to read the protection level of a process☆101Updated last year
- ☆116Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆84Updated last year
- ☆61Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆66Updated last year
- ApexLdr is a DLL Payload Loader written in C☆98Updated 2 months ago
- Do some DLL SideLoading magic☆72Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆143Updated last year
- ☆132Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆106Updated 11 months ago
- ☆65Updated this week
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆80Updated 3 months ago
- ☆105Updated last year
- ☆113Updated 11 months ago
- ☆90Updated 6 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- Just another C2 Redirector using CloudFlare.☆76Updated 4 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated 8 months ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆151Updated last year
- ☆58Updated 3 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆75Updated 6 months ago
- ☆142Updated 11 months ago
- Implant drop-in for EDR testing☆126Updated 10 months ago
- ☆172Updated 9 months ago
- A set of programs for analyzing common vulnerabilities in COM☆94Updated last week
- Tool for playing with Windows Access Token manipulation.☆50Updated last year