exploitblizzard / Syscall-Example
Using syscall to load shellcode, Evasion techniques
☆26Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Syscall-Example
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Inject shellcode into process via "EarlyBird"☆24Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- HookDetection☆44Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆63Updated last year
- ProcExp Driver (Ab)use☆20Updated last year
- One gate to all syscalls!☆23Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆78Updated 3 years ago
- ☆51Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- Unhook DLL via cleaning the DLL 's .text section☆8Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆104Updated 2 years ago
- Beacon Object Files.☆31Updated 8 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆32Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆48Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆37Updated 4 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆48Updated 4 years ago
- ☆29Updated 2 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆36Updated last year
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆49Updated 2 years ago
- Load PE via XML Attribute☆29Updated 4 years ago