icyguider / LatLoader
PoC module to demonstrate automated lateral movement with the Havoc C2 framework.
☆301Updated last year
Alternatives and similar repositories for LatLoader
Users that are interested in LatLoader are comparing it to the libraries listed below
Sorting:
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆189Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- ☆174Updated 6 months ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆300Updated 5 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆330Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆207Updated last week
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆361Updated 5 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆226Updated 2 years ago
- Shaco is a linux agent for havoc☆160Updated last year
- Patch AMSI and ETW☆239Updated last year
- Ghosting-AMSI☆169Updated 3 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆161Updated 2 months ago
- ☆302Updated last year
- ☆155Updated 9 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated 11 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆180Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆408Updated 11 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆237Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆199Updated 6 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆187Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆292Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 7 months ago
- AV bypass while you sip your Chai!☆221Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆219Updated last month
- Cobalt Strike BOF for evasive .NET assembly execution☆244Updated last month