idfp / lnk-builderLinks
Malicious shortcut file builder for spear-phishing and red-team engagement.
☆17Updated 2 years ago
Alternatives and similar repositories for lnk-builder
Users that are interested in lnk-builder are comparing it to the libraries listed below
Sorting:
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 7 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- .bin file to shellcode convertor☆38Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆81Updated 7 months ago
- ☆109Updated 9 months ago
- C# havoc implant☆101Updated 2 years ago
- Good CLR Host with Native patchless AMSI Bypass☆96Updated 6 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆102Updated last year
- ☆122Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- A C# port from Invoke-GhostTask☆118Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated last year
- ☆73Updated last year
- Python3 HTTP Server with upload functionality☆18Updated last year
- ☆128Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 5 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆78Updated last year
- Lateral Movement via the .NET Profiler☆84Updated 11 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆50Updated last year
- ☆92Updated last year
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆98Updated 4 months ago
- ☆100Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆156Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆59Updated 2 years ago