morph3 / Windows-RPC-BackdoorLinks
Simple windows rpc server for research purposes only
☆82Updated 3 years ago
Alternatives and similar repositories for Windows-RPC-Backdoor
Users that are interested in Windows-RPC-Backdoor are comparing it to the libraries listed below
Sorting:
- It stinks☆102Updated 3 years ago
- HookDetection☆46Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- x64 version☆36Updated 3 years ago
- ☆82Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 3 years ago
- ☆50Updated 4 years ago
- ☆55Updated 2 years ago
- ☆142Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆126Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆80Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- C# Tool to interact with MS Exchange based on MS docs☆101Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 3 years ago
- ☆57Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 2 years ago
- ☆146Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆136Updated 3 years ago
- ☆96Updated 3 years ago
- ☆114Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year