comosedice2012 / Introduction-to-Process-Hollowing
☆19Updated 3 years ago
Alternatives and similar repositories for Introduction-to-Process-Hollowing
Users that are interested in Introduction-to-Process-Hollowing are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 10 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 10 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- ☆25Updated 3 years ago
- Another AMSI bypass - but in C++.☆23Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 3 years ago
- ☆10Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆36Updated 11 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- ☆12Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year