evilashz / RemoteMemorymoduleLinks
Load the evilDLL from socket connection without touch disk
☆17Updated 3 years ago
Alternatives and similar repositories for RemoteMemorymodule
Users that are interested in RemoteMemorymodule are comparing it to the libraries listed below
Sorting:
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- A flexible tool that creates a minidump of the LSASS process☆13Updated 3 years ago
- ☆51Updated 5 years ago
- bypass UAC even when configured to always notify user☆30Updated 3 years ago
- Loads shellcode from a resource file.☆22Updated 5 years ago
- DLL Unhooking☆12Updated 4 years ago
- ShellCodeLoader via DInvoke☆58Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- ☆35Updated 4 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- A Simple ShellcodeLoader☆11Updated 4 years ago
- ☆11Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- A simple hidden vnc.☆33Updated 4 years ago
- uuid-shellcode-execution☆13Updated 4 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- ☆32Updated 5 years ago
- UAC_wenpon☆49Updated 3 years ago
- backdoor c2☆40Updated 5 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- HookDetection☆45Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago