loneicewolf / smbdoorLinks
improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys
☆50Updated 2 years ago
Alternatives and similar repositories for smbdoor
Users that are interested in smbdoor are comparing it to the libraries listed below
Sorting:
- A simple PE loader.☆27Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆65Updated 11 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A Bumblebee-inspired Crypter☆79Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆64Updated 2 years ago
- ☆57Updated 2 years ago
- Process Injection: APC Injection☆32Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆68Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆50Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆59Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- ☆62Updated 3 years ago
- API Hammering with C++20☆49Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- idk man this was the default github name☆35Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆36Updated 4 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- Various methods of executing shellcode☆72Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆124Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆71Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago