nickvangilder / To-Safe-Mode-And-BeyondLinks
A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into Normal Mode.
☆16Updated 3 years ago
Alternatives and similar repositories for To-Safe-Mode-And-Beyond
Users that are interested in To-Safe-Mode-And-Beyond are comparing it to the libraries listed below
Sorting:
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- ☆48Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆15Updated 3 years ago
- ☆30Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated last year
- Loads .NET Assembly Via CLR Loader☆16Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆26Updated 4 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆19Updated 2 years ago
- A simple PE loader.☆26Updated 2 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Updated last year
- Just another casual shellcode native loader☆24Updated 3 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Self Delete DLL☆23Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆15Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54Updated 5 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 7 months ago