jfmaes / AmsiHookerLinks
Hookers are cooler than patches.
☆170Updated 3 years ago
Alternatives and similar repositories for AmsiHooker
Users that are interested in AmsiHooker are comparing it to the libraries listed below
Sorting:
- A fake AMSI Provider which can be used for persistence.☆152Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆116Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆195Updated 4 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆110Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145Updated last year
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆177Updated 3 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆162Updated last year
- An example of using Syscalls in C# to get a meterpreter shell.☆111Updated 4 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆101Updated 2 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Patch AMSI and ETW☆246Updated last year
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- ☆113Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆195Updated 2 years ago
- ☆222Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆189Updated 3 years ago
- Fully modular persistence framework☆257Updated 2 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 2 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- ☆142Updated 3 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆182Updated last year
- Simple EDR implementation to demonstrate bypass☆179Updated 5 years ago
- ☆112Updated 2 years ago