marpie / signed-loaders
signed-loaders documents Windows executables that can be used for side-loading DLLs.
☆67Updated 5 years ago
Related projects: ⓘ
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆182Updated 3 years ago
- Shellcode injection POC using syscalls.☆116Updated 4 years ago
- ☆146Updated 4 years ago
- My CobaltStrike BOFS☆156Updated 2 years ago
- Example code for EDR bypassing☆149Updated 5 years ago
- Beacon Object File (BOF) Creation Helper☆219Updated 2 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 5 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆32Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆108Updated 4 years ago
- ☆111Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆119Updated 4 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆164Updated 3 years ago
- Shellcode injector using direct syscalls☆116Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆138Updated 4 years ago
- ☆150Updated this week
- PoC to demonstrate how CLR ETW events can be tampered.☆184Updated 4 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆145Updated 4 years ago
- ☆88Updated this week
- Perform DCSync operation without mimikatz☆136Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs