comosedice2012 / Introduction-to-Process-Hollowing
☆19Updated 3 years ago
Alternatives and similar repositories for Introduction-to-Process-Hollowing:
Users that are interested in Introduction-to-Process-Hollowing are comparing it to the libraries listed below
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Another AMSI bypass - but in C++.☆23Updated last year
- ☆16Updated 4 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆17Updated 3 years ago
- ☆12Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆24Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 7 months ago
- ☆10Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆51Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- ☆11Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆16Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆26Updated last year
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆18Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago