hlldz / APC-PPIDView external linksLinks
Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.
☆158Jun 10, 2019Updated 6 years ago
Alternatives and similar repositories for APC-PPID
Users that are interested in APC-PPID are comparing it to the libraries listed below
Sorting:
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 4 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆149Feb 15, 2020Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Apfell Golang macOS/Linux/Windows implant☆90Jul 31, 2021Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- ☆92Apr 17, 2021Updated 4 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆330May 3, 2020Updated 5 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,151Dec 22, 2022Updated 3 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Apr 28, 2020Updated 5 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆819Mar 11, 2021Updated 4 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆808Jul 6, 2020Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 6 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 6 years ago