cepxeo / dll4shell
Shellcode launcher for AV bypass
☆217Updated last year
Alternatives and similar repositories for dll4shell:
Users that are interested in dll4shell are comparing it to the libraries listed below
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- COM Hijacking VOODOO☆265Updated this week
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆393Updated 8 months ago
- MS-FSRVP coercion abuse PoC☆284Updated 3 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆321Updated last year
- Attempt at Obfuscated version of SharpCollection☆203Updated 2 weeks ago
- Run Powershell without software restrictions.☆285Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆258Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆363Updated 3 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆460Updated last year
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- Kill AV/EDR leveraging BYOVD attack☆341Updated last year
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆310Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆447Updated 11 months ago
- Bypass AMSI by patching AmsiScanBuffer☆258Updated 3 years ago
- Collection of remote authentication triggers in C#☆474Updated 9 months ago
- C# Lsass parser☆284Updated 3 years ago
- Persistence by writing/reading shellcode from Event Log☆369Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- ☆449Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆265Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated 2 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- XLL Phishing Tradecraft☆408Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated 10 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆385Updated 11 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆434Updated 3 weeks ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆230Updated last year