comosedice2012 / Introduction-to-Process-HollowingLinks
☆19Updated 3 years ago
Alternatives and similar repositories for Introduction-to-Process-Hollowing
Users that are interested in Introduction-to-Process-Hollowing are comparing it to the libraries listed below
Sorting:
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- ☆10Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆25Updated 3 years ago
- ☆12Updated 4 years ago
- ☆12Updated 2 years ago
- ☆25Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- ☆18Updated last year
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 11 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- ☆33Updated 2 years ago