hackerhouse-opensource / OffensiveLua
Offensive Lua.
☆179Updated last year
Alternatives and similar repositories for OffensiveLua:
Users that are interested in OffensiveLua are comparing it to the libraries listed below
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆332Updated 7 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆286Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- A bunch of scripts and code i wrote.☆135Updated 2 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- ☆269Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆159Updated last year
- Local & remote Windows DLL Proxying☆161Updated 7 months ago
- ☆164Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆250Updated 7 months ago
- ☆137Updated 6 months ago
- Nameless C2 - A C2 with all its components written in Rust☆258Updated 4 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆159Updated last month
- ☆250Updated last year
- Open Source C&C Specification☆224Updated this week
- ☆105Updated 6 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆185Updated 7 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆131Updated last year
- ☆332Updated last year
- A PoC for Early Cascade process injection technique.☆137Updated this week
- (0day) Local Privilege Escalation in IObit Malware Fighter☆110Updated 3 weeks ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆215Updated 3 months ago
- Native Syscalls Shellcode Injector☆264Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- A shellcode injection tool showcasing various process injection techniques☆135Updated last year
- ☆184Updated last year