mez-0 / citadelLinks
A Payload Analysis Framework
☆109Updated 3 weeks ago
Alternatives and similar repositories for citadel
Users that are interested in citadel are comparing it to the libraries listed below
Sorting:
- ☆108Updated last year
- macOS dylib stager☆36Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Internal Monologue BOF☆77Updated 10 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆88Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆80Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆74Updated 3 months ago
- Mentally ill EtwTi parser☆66Updated 2 weeks ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆84Updated 3 months ago
- ☆51Updated last year
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆72Updated this week
- Easy peasy file uploads☆27Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 5 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 8 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆129Updated 2 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 10 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆130Updated 3 months ago
- Sniffing files generator☆59Updated 8 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆19Updated last year
- Find jmp gadgets for call stack spoofing.☆63Updated last month
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 3 months ago
- RPC to WebClient startup☆52Updated 2 months ago
- A collection of position independent coding resources☆94Updated last month
- Proxy function calls through the thread pool with ease☆30Updated 8 months ago
- A hoontr must hoont☆99Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- A small How-To on creating your own weaponized WSL file☆117Updated 3 months ago