kymb0 / Stealth_shellcode_runners
☆56Updated last year
Alternatives and similar repositories for Stealth_shellcode_runners:
Users that are interested in Stealth_shellcode_runners are comparing it to the libraries listed below
- C# havoc implant☆99Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 7 months ago
- ☆86Updated last year
- ☆141Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆93Updated 2 years ago
- Lateral Movement☆123Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆66Updated 3 weeks ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 4 months ago
- ☆97Updated last year
- Secretsdump C# version only supporting local (live) operation☆49Updated 2 weeks ago
- ☆88Updated 2 years ago
- ☆106Updated 2 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- ☆125Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- ☆62Updated 2 years ago
- Library of BOFs to interact with SQL servers☆163Updated 3 weeks ago
- ☆49Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆152Updated last year
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year