janoglezcampos / FindItByCalls
Hacky code for extracting calls in DLLs by function
☆14Updated 2 years ago
Alternatives and similar repositories for FindItByCalls:
Users that are interested in FindItByCalls are comparing it to the libraries listed below
- ☆37Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 4 years ago
- ☆14Updated 2 years ago
- ☆42Updated last year
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Self Delete DLL☆23Updated 11 months ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆33Updated 3 years ago
- ☆59Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- ☆43Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆24Updated last year
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- ☆29Updated 2 years ago
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆17Updated 9 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆49Updated 2 years ago
- ☆36Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆85Updated 3 years ago
- A care package of useful bofs for red team engagments☆54Updated last month
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 7 months ago
- ☆50Updated 4 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated last year
- One gate to all syscalls!☆23Updated 2 years ago