netbiosX / AMSI-Provider
A fake AMSI Provider which can be used for persistence.
☆134Updated 3 years ago
Related projects: ⓘ
- Simple EDR implementation to demonstrate bypass☆152Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆177Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆109Updated 10 months ago
- Evasive Process Hollowing Techniques☆132Updated 4 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆157Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆87Updated 2 years ago
- Simple APPLocker bypass summary☆39Updated 5 years ago
- ☆99Updated this week
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆93Updated last year
- Collection of Beacon Object Files (BOFs) for shells and lols☆111Updated 3 years ago
- ☆135Updated 2 years ago
- ☆140Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆108Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- ☆146Updated 4 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆82Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆169Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆182Updated 3 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆164Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆139Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆136Updated 3 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆98Updated 2 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆114Updated last year
- MiniDumpWriteDump behavior modification hook☆49Updated 3 years ago
- Remove API hooks from a Beacon process.☆263Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆84Updated last year
- UI for creating LNKs☆97Updated 3 years ago
- Cobalt Strike Beacon Object Files☆158Updated 2 years ago