lem0nSec / SkeletonKeyLinks
Reproducing the SkeletonKey malware.
☆10Updated last year
Alternatives and similar repositories for SkeletonKey
Users that are interested in SkeletonKey are comparing it to the libraries listed below
Sorting:
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- ☆47Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- ☆61Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- ☆24Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Updated 9 months ago
- Modify managed functions from unmanaged code☆53Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆44Updated 2 years ago
- ☆33Updated last year
- Unix Process hollowing in rust☆22Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated this week
- ☆39Updated 10 months ago
- EvtPsst☆55Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago