cpu0x00 / Ghost
Evasive shellcode loader
☆315Updated 3 months ago
Alternatives and similar repositories for Ghost:
Users that are interested in Ghost are comparing it to the libraries listed below
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆174Updated 4 months ago
- ☆337Updated last month
- Extract and execute a PE embedded within a PNG file using an LNK file.☆340Updated 2 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆375Updated 5 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆270Updated 8 months ago
- Open Source C&C Specification☆224Updated this week
- Nameless C2 - A C2 with all its components written in Rust☆258Updated 4 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆243Updated 9 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆506Updated 3 weeks ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆330Updated last month
- A beacon object file implementation of PoolParty Process Injection Technique.☆366Updated last year
- shellcode loader for your evasion needs☆309Updated 2 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆271Updated 9 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆410Updated last month
- Execute shellcode files with rundll32☆191Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆439Updated 11 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆394Updated 11 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆285Updated 3 months ago
- ☆250Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆458Updated 11 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆557Updated 6 months ago
- early cascade injection PoC based on Outflanks blog post☆196Updated 2 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆383Updated 6 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆254Updated 6 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆408Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆275Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆169Updated 2 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆417Updated 2 months ago
- yet another AV killer tool using BYOVD☆264Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆286Updated last year