kleiton0x00 / RemoteShellcodeExec
Execute shellcode from a remote-hosted bin file using Winhttp.
☆229Updated last year
Alternatives and similar repositories for RemoteShellcodeExec:
Users that are interested in RemoteShellcodeExec are comparing it to the libraries listed below
- .NET assembly loader with patchless AMSI and ETW bypass☆309Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆301Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆203Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆384Updated 7 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆222Updated last year
- Terminate AV/EDR Processes using kernel driver☆340Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆181Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆446Updated 6 months ago
- Execute shellcode files with rundll32☆191Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆204Updated last year
- My implementation of the GIUDA project in C++☆167Updated last year
- Evasive Golang Loader☆132Updated 6 months ago
- Weaponized HellsGate/SigFlip☆198Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆282Updated last year
- Kill AV/EDR leveraging BYOVD attack☆335Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆366Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆318Updated last year
- Patch AMSI and ETW☆234Updated 8 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆321Updated 6 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆169Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆180Updated last year
- Attempt at Obfuscated version of SharpCollection☆203Updated 2 weeks ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆286Updated last year
- ☆240Updated 2 years ago
- Shaco is a linux agent for havoc☆155Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆271Updated 9 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆243Updated 9 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆330Updated last month
- EDRSandblast-GodFault☆248Updated last year