dis0rder0x00 / ParentProcessManipulation-LNKLinks
Using LNK files and user input simulation to start processes under explorer.exe
☆25Updated 9 months ago
Alternatives and similar repositories for ParentProcessManipulation-LNK
Users that are interested in ParentProcessManipulation-LNK are comparing it to the libraries listed below
Sorting:
- BypassCredGuard CS BOF☆42Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆20Updated 2 years ago
- ☆44Updated last month
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆44Updated this week
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- ☆30Updated 3 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- A VSCode plugin to assist with BOF development.☆37Updated 10 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Sliver agent rewritten in C++☆44Updated 9 months ago
- ☆27Updated 5 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆40Updated 9 months ago
- Groovy Post Exploitation☆20Updated 8 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- ☆71Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- Library of BOFs to interact with SQL servers☆22Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 5 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 4 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆24Updated last week
- Bypassing Amsi using LdrLoadDll☆44Updated 5 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆45Updated 2 years ago
- ☆38Updated 2 weeks ago
- Less sugar (entropy) for your binaries☆25Updated 3 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆52Updated last week
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- ☆23Updated 4 months ago