idfp / lnk-builder
Malicious shortcut file builder for spear-phishing and red-team engagement.
☆14Updated last year
Alternatives and similar repositories for lnk-builder
Users that are interested in lnk-builder are comparing it to the libraries listed below
Sorting:
- ☆70Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 6 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆73Updated 6 months ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 6 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- C# havoc implant☆99Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Python3 HTTP Server with upload functionality☆13Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- .bin file to shellcode convertor☆35Updated 10 months ago
- ☆106Updated 2 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆125Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆87Updated 3 months ago
- ☆86Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆34Updated 11 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆119Updated 2 years ago
- ☆80Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- ☆123Updated last year
- ☆97Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆55Updated 2 years ago