moloch-- / sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
☆26Updated 2 years ago
Alternatives and similar repositories for sgn:
Users that are interested in sgn are comparing it to the libraries listed below
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func …☆86Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆50Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆36Updated 3 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆75Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆85Updated 2 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Remove API hooks from a Beacon process.☆57Updated 3 years ago
- ☆93Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Sleep Obfuscation☆45Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- ☆55Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆96Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Create a lnk shortcut file for Windows☆17Updated 5 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆59Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆100Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆90Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆117Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆31Updated 2 years ago