nettitude / Tartarus-TpAllocInjectLinks
☆209Updated 2 years ago
Alternatives and similar repositories for Tartarus-TpAllocInject
Users that are interested in Tartarus-TpAllocInject are comparing it to the libraries listed below
Sorting:
- An App Domain Manager Injection DLL PoC on steroids☆210Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- ☆151Updated 2 years ago
- ☆137Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆127Updated 2 years ago
- Shaco is a linux agent for havoc☆169Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Updated 6 months ago
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- Patching AmsiOpenSession by forcing an error branching☆154Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆147Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆271Updated 2 years ago
- Patch AMSI and ETW☆250Updated last year
- ☆159Updated last year
- My implementation of the GIUDA project in C++☆188Updated 2 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆264Updated 9 months ago
- ☆125Updated last month
- ☆125Updated 2 years ago
- EDRSandblast-GodFault☆271Updated 2 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 11 months ago
- ☆138Updated last year
- ☆122Updated 2 years ago
- Your syscall factory☆126Updated 3 weeks ago