mgeeky / msi-shenanigansView external linksLinks
Proof of Concept code and samples presenting emerging threat of MSI installer files.
☆90Dec 15, 2022Updated 3 years ago
Alternatives and similar repositories for msi-shenanigans
Users that are interested in msi-shenanigans are comparing it to the libraries listed below
Sorting:
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Aug 8, 2022Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆134Dec 20, 2022Updated 3 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- ☆151Oct 2, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆103Jun 8, 2022Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆162May 27, 2020Updated 5 years ago
- ☆122Oct 9, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆196Dec 14, 2022Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆259May 10, 2023Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146May 18, 2024Updated last year
- ☆290Jul 20, 2023Updated 2 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Jan 3, 2023Updated 3 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆271Apr 17, 2023Updated 2 years ago
- ☆274Jan 14, 2023Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆138Sep 12, 2022Updated 3 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- ☆247Dec 16, 2022Updated 3 years ago
- You shall pass☆271Jul 16, 2022Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Nov 15, 2022Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆226May 3, 2023Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- Fully modular persistence framework☆258Apr 10, 2023Updated 2 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Jan 28, 2022Updated 4 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆141Apr 21, 2022Updated 3 years ago