exploitblizzard / Syscall-ExampleLinks
Using syscall to load shellcode, Evasion techniques
☆27Updated 4 years ago
Alternatives and similar repositories for Syscall-Example
Users that are interested in Syscall-Example are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆87Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆81Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Flexible C# shellcode runner☆39Updated 3 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆102Updated 4 years ago
- HookDetection☆46Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆63Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆98Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆111Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 11 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆27Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆77Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆127Updated 3 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆38Updated 5 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- Implementation of SpoolSample without rDLL☆28Updated 4 years ago
- ☆94Updated 3 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆58Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆86Updated 2 years ago