idfp / lnk-builderLinks
Malicious shortcut file builder for spear-phishing and red-team engagement.
☆15Updated 2 years ago
Alternatives and similar repositories for lnk-builder
Users that are interested in lnk-builder are comparing it to the libraries listed below
Sorting:
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 5 months ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆81Updated 2 years ago
- PowerShell script to terminate protected processes such as anti-malware and EDRs.☆28Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- .bin file to shellcode convertor☆38Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- Good CLR Host with Native patchless AMSI Bypass☆88Updated 4 months ago
- A C# port from Invoke-GhostTask☆118Updated last year
- Python3 HTTP Server with upload functionality☆16Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆36Updated 2 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- ☆88Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- ☆124Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆57Updated 8 months ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆58Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆203Updated last year
- ☆110Updated 6 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆49Updated last year
- ☆119Updated 5 months ago
- ☆100Updated 2 years ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- ☆90Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆26Updated 11 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆27Updated 10 months ago
- ☆73Updated last year
- Execute shellcode via Bluetooth device authentication☆40Updated 6 months ago
- Lsass dumper evading (some) EDR detection☆26Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year