Adaptive DLL hijacking / dynamic export forwarding - EAT preserve
☆79Aug 5, 2024Updated last year
Alternatives and similar repositories for koppeling-p
Users that are interested in koppeling-p are comparing it to the libraries listed below
Sorting:
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆137Aug 10, 2024Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆360Aug 11, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆58Feb 16, 2025Updated last year
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Aug 21, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- ☆33Mar 19, 2025Updated 11 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- ☆100Sep 1, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆137Apr 18, 2025Updated 10 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- Position-independent Reflective Loader for macOS☆118Feb 19, 2026Updated 2 weeks ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- ☆160Jan 27, 2025Updated last year
- ☆147Oct 29, 2024Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- Process injection alternative☆406Sep 6, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- ☆159Dec 13, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆411Jan 11, 2026Updated last month