d4rkiZ / EmbedExeLnk-
EmbedExeLnk by x86matthew modified by d4rkiZ
☆34Updated last year
Alternatives and similar repositories for EmbedExeLnk-:
Users that are interested in EmbedExeLnk- are comparing it to the libraries listed below
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- BypassCredGuard CS BOF☆31Updated last month
- Sliver agent rewritten in C++☆44Updated 6 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆19Updated 2 weeks ago
- ☆94Updated 6 months ago
- ☆52Updated 2 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 5 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 4 months ago
- SAM Dumping in C#☆44Updated last month
- Click Once + App Domain☆62Updated last year
- Execute dotnet app from unmanaged process☆71Updated 2 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 4 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆98Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆45Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆80Updated last month
- ☆36Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- ☆52Updated last month
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆25Updated 8 months ago