Reasonably undetected shellcode stager and executer.
☆35May 23, 2025Updated 9 months ago
Alternatives and similar repositories for Sneaky-DLL-Stager
Users that are interested in Sneaky-DLL-Stager are comparing it to the libraries listed below
Sorting:
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆240Jun 22, 2023Updated 2 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- ☆27May 1, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Do some DLL SideLoading magic☆90Sep 20, 2023Updated 2 years ago
- Native Syscalls Shellcode Injector☆267Jul 2, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆15Aug 22, 2022Updated 3 years ago
- Threadless Process Injection through entry point hijacking☆351Sep 10, 2024Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Jul 30, 2024Updated last year
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆131Mar 15, 2024Updated 2 years ago
- ☆106May 15, 2023Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Sep 4, 2023Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- RunPE implementation with multiple evasive techniques (1)☆383Sep 22, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 2 months ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆501Jan 10, 2023Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago