furax124 / Protect_LoaderLinks
A fucking real shellcode loader with a GUI. Work-in-Progress.
☆75Updated last week
Alternatives and similar repositories for Protect_Loader
Users that are interested in Protect_Loader are comparing it to the libraries listed below
Sorting:
- Bypasses AMSI protection through remote memory patching and parsing technique.☆44Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆50Updated last month
- Threadless shellcode injection tool☆65Updated 10 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆83Updated 2 months ago
- ForsHops☆53Updated 2 months ago
- Good CLR Host with Native patchless AMSI Bypass☆79Updated 2 months ago
- Shellcode loader☆84Updated 6 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆123Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆81Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆46Updated last month
- A reflective DLL development template for the Rust programming language☆94Updated last month
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- Go Shellcode Loader to be Integrated in Exploration C2☆27Updated 4 months ago
- shell code example☆49Updated last month
- A Mythic agent for Windows written in C☆125Updated 3 weeks ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆97Updated 2 months ago
- TypeLib persistence technique☆115Updated 7 months ago
- Section-based payload obfuscation technique for x64☆60Updated 10 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆35Updated 3 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆130Updated 10 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- remote process injections using pool party techniques☆62Updated 4 months ago
- Template-based generation of shellcode loaders☆77Updated last year
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆139Updated last week
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Linker for Beacon Object Files☆115Updated this week
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆184Updated 4 months ago
- I have documented all of the AMSI patches that I learned till now☆72Updated 2 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆54Updated 3 weeks ago