PoC Thread Execution Hijacking for Win32 Code Injection
☆177Aug 8, 2024Updated last year
Alternatives and similar repositories for threadfire
Users that are interested in threadfire are comparing it to the libraries listed below
Sorting:
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Dec 28, 2022Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- Baseline/Test for persistence in common Windows Registry locations☆23Jan 30, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆824Mar 10, 2022Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Simple 32/64-bit PEs loader.☆139Dec 19, 2018Updated 7 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated this week
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆164Jul 25, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆787Jun 23, 2022Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Jun 25, 2022Updated 3 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆158Jun 10, 2019Updated 6 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago