signed-loaders documents Windows executables that can be used for side-loading DLLs.
☆70Jan 7, 2019Updated 7 years ago
Alternatives and similar repositories for signed-loaders
Users that are interested in signed-loaders are comparing it to the libraries listed below
Sorting:
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- UAC_wenpon☆49Nov 25, 2021Updated 4 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- PoC to interact with local/remote registry hives through WMI☆87Jun 14, 2020Updated 5 years ago
- 一个demo☆23Apr 2, 2024Updated last year
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- proxy your C2 traffic through CDN using websocket☆52Jul 24, 2022Updated 3 years ago
- ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。☆18Apr 2, 2022Updated 3 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- ☆13Aug 25, 2021Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 3 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- A little tool to play with the Seclogon service☆326Jul 10, 2022Updated 3 years ago
- 一个各类漏洞POC知识库☆11Jul 18, 2022Updated 3 years ago
- Converts PE into a shellcode☆2,752Aug 30, 2025Updated 6 months ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆114Oct 21, 2023Updated 2 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- SymbolTypeViewer_汉化☆17Sep 4, 2020Updated 5 years ago
- grim reaper c2☆346Nov 19, 2022Updated 3 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆155Aug 17, 2020Updated 5 years ago
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- 承影用的 nuclei 漏扫模板☆15Jun 11, 2023Updated 2 years ago