ghost5egy / Shellcode-GhostLinks
☆13Updated 2 years ago
Alternatives and similar repositories for Shellcode-Ghost
Users that are interested in Shellcode-Ghost are comparing it to the libraries listed below
Sorting:
- DLL Unhooking☆12Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Beacon Object Files.☆35Updated last year
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 3 years ago
- Cs-Sleep-Mask-Fiber☆18Updated 2 weeks ago
- Use current thread token to execute command☆15Updated 4 years ago
- ☆13Updated 2 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Use powershell to getsystem with token dumplication☆10Updated 5 years ago
- ☆51Updated 5 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- desktop screenshot☆30Updated 2 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆24Updated 11 months ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆32Updated 2 months ago
- SyscallLoader☆11Updated 3 years ago