caueb / MockingjayLinks
Mockingjay process self injection POC
☆38Updated 2 years ago
Alternatives and similar repositories for Mockingjay
Users that are interested in Mockingjay are comparing it to the libraries listed below
Sorting:
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆106Updated 3 weeks ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- ☆124Updated 11 months ago
- ☆116Updated 4 months ago
- Do some DLL SideLoading magic☆85Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆155Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆190Updated 8 months ago
- ☆108Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆101Updated 2 weeks ago
- Simple BOF to read the protection level of a process☆118Updated 2 years ago
- Lateral Movement via the .NET Profiler☆82Updated 8 months ago
- A BOF to enumerate system process, their protection levels, and more.☆117Updated 8 months ago
- ☆124Updated last year
- ☆155Updated 7 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Impersonate Tokens using only NTAPI functions☆79Updated 4 months ago
- A Mythic agent for Windows written in C☆131Updated 2 weeks ago
- Find DLLs with RWX section☆81Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆121Updated 6 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆186Updated 6 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- A Mythic Agent written in PIC C.☆196Updated 6 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆119Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆78Updated 5 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆99Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- Good CLR Host with Native patchless AMSI Bypass☆84Updated 3 months ago
- ☆45Updated last month