itaymigdal / PartyLoader
Threadless shellcode injection tool
☆63Updated 8 months ago
Alternatives and similar repositories for PartyLoader:
Users that are interested in PartyLoader are comparing it to the libraries listed below
- ☆96Updated 7 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆82Updated 2 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆111Updated 2 months ago
- ☆127Updated 7 months ago
- Execute dotnet app from unmanaged process☆72Updated 3 months ago
- ☆107Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆74Updated last month
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- ☆98Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆81Updated last week
- ☆79Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- TypeLib persistence technique☆110Updated 5 months ago
- A Mythic agent for Windows written in C☆115Updated last week
- ☆53Updated 2 months ago
- ☆52Updated 3 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 5 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆38Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ForsHops☆40Updated 3 weeks ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆32Updated last month
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Execute shellcode via Bluetooth device authentication☆37Updated last month
- lsassdump via RtlCreateProcessReflection and NanoDump☆79Updated 5 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated 3 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆40Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year