loneicewolf / smbdoor
improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys
☆49Updated last year
Related projects ⓘ
Alternatives and complementary repositories for smbdoor
- Get your data from the resource section manually, with no need for windows apis☆53Updated last month
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- ☆48Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 11 months ago
- API Hammering with C++20☆34Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆37Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆33Updated 3 years ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 9 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- ☆12Updated last year
- ☆38Updated last year
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- ☆21Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆75Updated 3 years ago
- ☆58Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago