cr7pt0pl4gu3 / PestilenceLinks
Shellcode loader designed for evasion. Coded in Rust.
☆133Updated 2 years ago
Alternatives and similar repositories for Pestilence
Users that are interested in Pestilence are comparing it to the libraries listed below
Sorting:
- Some Rust program I wrote while learning Malware Development☆149Updated 8 months ago
- Reuse open handles to dynamically dump LSASS.☆244Updated last year
- CobaltStrike beacon in rust☆206Updated last year
- Port of Cobalt Strike's Process Inject Kit☆186Updated 10 months ago
- Shaco is a linux agent for havoc☆167Updated last year
- Weaponized HellsGate/SigFlip☆203Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- Execute shellcode files with rundll32☆207Updated last year
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆267Updated last year
- ☆245Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆201Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆258Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆319Updated 2 years ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆159Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆225Updated 7 months ago
- A COFF loader made in Rust☆312Updated last month
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆197Updated last year
- AV bypass while you sip your Chai!☆224Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆161Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆155Updated 11 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆158Updated last month
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆201Updated 3 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆212Updated 3 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆282Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆255Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆236Updated 2 years ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆244Updated 3 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆248Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆170Updated last week