lisandro-git / sandbox_evasion
Sandbox evasion code snippets developped in Golang
β19Updated 2 years ago
Alternatives and similar repositories for sandbox_evasion:
Users that are interested in sandbox_evasion are comparing it to the libraries listed below
- ππͺ² Malleable C2 profiles parser and assembler written in golangβ62Updated 9 months ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.β112Updated 3 years ago
- Perform DCSync operation without mimikatzβ142Updated 3 months ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFsβ121Updated 2 years ago
- AV/EDR evasion via direct system calls.β107Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFSβ175Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass processβ61Updated 3 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.β149Updated 3 years ago
- A Golang implant that uses Discord as a C2 team serverβ65Updated 2 months ago
- Another Go Shellcode Loader using Windows APIsβ139Updated 3 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloadsβ99Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.β141Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022β53Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are aβ¦β127Updated 2 years ago
- Beacon Object File PoC implementation of KillDefenderβ218Updated 2 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified processβ33Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonationβ140Updated 3 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object Fileβ191Updated 4 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withouβ¦β171Updated last year
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.β16Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config filesβ112Updated 3 years ago
- POC tools for exploring SMB over QUIC protocolβ121Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.β187Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assemblyβ117Updated 4 months ago
- Bypass Detection By Randomising ROR13 API Hashesβ135Updated 2 years ago
- A Cobalt Strike memory evasion loader for redteamersβ97Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA pluginβ199Updated 2 years ago
- A simple BOF that frees UDRLsβ115Updated 2 years ago
- My CobaltStrike BOFSβ161Updated 2 years ago
- Collection of CobaltStrike beacon object filesβ102Updated 3 years ago