itaymigdal / PoshitoLinks
Poshito is a Windows C2 over Telegram
☆17Updated last year
Alternatives and similar repositories for Poshito
Users that are interested in Poshito are comparing it to the libraries listed below
Sorting:
- Bypasses AMSI protection through remote memory patching and parsing technique.☆52Updated 6 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆112Updated last week
- A collection of position independent coding resources☆100Updated last week
- Linker for Beacon Object Files☆130Updated 3 weeks ago
- Indirect syscalls + DInvoke made simple.☆95Updated 11 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆90Updated last month
- Threadless shellcode injection tool☆67Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆77Updated 2 months ago
- ForsHops☆59Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- malware written for educational purposes☆69Updated last week
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 8 months ago
- Nim process hollowing loader☆60Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Internal Monologue BOF☆79Updated 10 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆31Updated 7 months ago
- ☆45Updated last month
- shell code example☆63Updated 3 weeks ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆131Updated 2 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆55Updated 7 months ago
- ☆97Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆69Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆90Updated 2 weeks ago
- A process injection technique using only thread context manipulation☆39Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- A collection of PoCs to do common things in unconventional ways☆119Updated 2 months ago
- Spawn SYSTEM shells like a PRO!☆10Updated 2 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆69Updated last week
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆106Updated 10 months ago
- ☆38Updated 7 months ago