C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
☆91Mar 29, 2020Updated 5 years ago
Alternatives and similar repositories for ReverseShellDll
Users that are interested in ReverseShellDll are comparing it to the libraries listed below
Sorting:
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Dec 13, 2020Updated 5 years ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 5 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Windows (ShadowMove) Socket Duplication☆87Apr 19, 2020Updated 5 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- ☆28Mar 26, 2020Updated 5 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆85Dec 20, 2019Updated 6 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆807Jul 6, 2020Updated 5 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- The program is designed to obfuscate the shellcode.☆203Jul 13, 2021Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆70Dec 7, 2019Updated 6 years ago
- Red Team Operator: Malware Development Essentials Course☆100Jun 18, 2020Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Aug 13, 2020Updated 5 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆607Feb 16, 2023Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,439Dec 18, 2022Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆168May 30, 2024Updated last year
- A native backdoor module for Microsoft IIS (Internet Information Services)☆557Jul 3, 2020Updated 5 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆838Oct 3, 2021Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆744Jul 25, 2023Updated 2 years ago