joshfaust / Simple-Loader
Windows Defender ShellCode Execution Bypass
☆128Updated 5 years ago
Alternatives and similar repositories for Simple-Loader:
Users that are interested in Simple-Loader are comparing it to the libraries listed below
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- PoC for UUID shellcode execution using DInvoke☆149Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆113Updated 5 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆257Updated 3 years ago
- My CobaltStrike BOFS☆162Updated 2 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆112Updated last year
- Encrypting shellcode to Bypass AV☆72Updated 6 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆170Updated 5 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆151Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 5 years ago
- ☆112Updated 4 years ago
- Shellcode injection POC using syscalls.☆115Updated 4 years ago
- SMBExec C# module☆215Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆268Updated last year
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- Windows NTLM Authentication Backdoor☆234Updated 2 months ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆105Updated 2 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆113Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆199Updated 3 years ago
- Run shellcode from resource☆254Updated 4 years ago
- Process Ghosting Tool☆169Updated 3 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆116Updated last year
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆89Updated 4 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆222Updated last year
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆137Updated 3 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆127Updated 9 months ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆241Updated 3 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago