gavz / ExplorerPersistLinks
Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed
☆84Updated 3 years ago
Alternatives and similar repositories for ExplorerPersist
Users that are interested in ExplorerPersist are comparing it to the libraries listed below
Sorting:
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Updated last year
- ☆84Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- ☆92Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆124Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack