florylsk / ExecIT
Execute shellcode files with rundll32
☆193Updated last year
Alternatives and similar repositories for ExecIT:
Users that are interested in ExecIT are comparing it to the libraries listed below
- Evasive Golang Loader☆129Updated 7 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆216Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Generic PE loader for fast prototyping evasion techniques☆229Updated 8 months ago
- Shaco is a linux agent for havoc☆156Updated last year
- Patching AmsiOpenSession by forcing an error branching☆144Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆178Updated last week
- .NET assembly loader with patchless AMSI and ETW bypass☆319Updated last year
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆232Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 9 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆181Updated last year
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆238Updated 9 months ago
- ☆181Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆183Updated 3 months ago
- A basic emulation of an "RPC Backdoor"☆239Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆320Updated 2 years ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆169Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆374Updated last year
- ApexLdr is a DLL Payload Loader written in C☆109Updated 8 months ago
- ☆223Updated 10 months ago
- ☆165Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆167Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆304Updated 11 months ago
- Generate Shellcode Loaders & Injects☆155Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆102Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆340Updated last year