jfmaes / AmsiHooker
Hookers are cooler than patches.
☆166Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for AmsiHooker
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆184Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆178Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- Patch AMSI and ETW☆232Updated 6 months ago
- POC for frustrating/defeating Malware Analysts☆150Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆313Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆154Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆227Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆145Updated 9 months ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆232Updated 3 years ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- Fully modular persistence framework☆248Updated last year
- C# version of MDSec's ParallelSyscalls☆138Updated 2 years ago
- You shall pass☆249Updated 2 years ago
- Koppeling x Metatwin x LazySign☆203Updated 3 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆101Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆317Updated 4 months ago
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- ☆138Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆135Updated 6 months ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Updated last year
- Find .net assemblies locally☆88Updated 2 years ago