houseofint3 / windows-ps-callbacks-experimentsLinks
Files for http://blog.deniable.org/posts/windows-callbacks/
☆12Updated 2 years ago
Alternatives and similar repositories for windows-ps-callbacks-experiments
Users that are interested in windows-ps-callbacks-experiments are comparing it to the libraries listed below
Sorting:
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- ☆43Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆47Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- miscellaneous codes☆35Updated 2 years ago
- ☆24Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 5 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- Python module for running BOFs☆74Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- Self Delete DLL☆23Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Updated 3 years ago
- ☆29Updated last year
- ☆23Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- ☆31Updated 3 years ago
- ☆36Updated last year
- Click Once + App Domain☆64Updated last year
- Golang Implementation of Hell's gate☆20Updated 2 years ago