magisterquis / alpt4atsLinks
A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024
☆16Updated last year
Alternatives and similar repositories for alpt4ats
Users that are interested in alpt4ats are comparing it to the libraries listed below
Sorting:
- Shellcode reflective DLL injection in Rust☆24Updated 3 months ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- Load and execute a common object file format (COFF) in the current process☆31Updated last year
- ☆18Updated last year
- Load a dynamic library from memory using a fuse mount☆31Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- Unpacker for donut shellcode☆17Updated 5 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- ☆43Updated 2 years ago
- ☆39Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- A library to make HTTP requests with the Windows winhttp API☆24Updated last year
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆11Updated 4 months ago
- ☆30Updated 8 months ago
- ☆31Updated 2 years ago
- Golang Implementation of Hell's gate☆19Updated 2 years ago
- all credits go to @mgeeky☆64Updated 4 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- LoadLibrary for offensive operations☆33Updated 3 years ago
- ☆28Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆52Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Updated 3 years ago
- Loads a program into a memfd and runs it.☆13Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 5 months ago