nullsection / Sneaky-DLL-Stager
Reasonably undetected shellcode stager and executer.
☆35Updated 4 months ago
Alternatives and similar repositories for Sneaky-DLL-Stager:
Users that are interested in Sneaky-DLL-Stager are comparing it to the libraries listed below
- ☆47Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆45Updated last year
- ☆73Updated last year
- I have documented all of the AMSI patches that I learned till now☆69Updated last year
- A care package of useful bofs for red team engagments☆54Updated last month
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated 3 weeks ago
- Lateral Movement via the .NET Profiler☆77Updated 2 months ago
- ☆61Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆65Updated 2 weeks ago
- ☆48Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Windows Thread Pool Injection Havoc Implementation☆28Updated 10 months ago
- Sleep Obfuscation☆43Updated 2 years ago
- Find DLLs with RWX section☆76Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆73Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- C# havoc implant☆96Updated last year
- Click Once + App Domain☆63Updated last year
- ☆92Updated 4 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 3 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆58Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆77Updated 3 months ago
- ☆122Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆92Updated 11 months ago