nullsection / Sneaky-DLL-Stager
Reasonably undetected shellcode stager and executer.
☆37Updated 8 months ago
Alternatives and similar repositories for Sneaky-DLL-Stager
Users that are interested in Sneaky-DLL-Stager are comparing it to the libraries listed below
Sorting:
- Run Cobalt Strike BOFs in Brute Ratel C4!☆66Updated 3 weeks ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- I have documented all of the AMSI patches that I learned till now☆72Updated last month
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- C# havoc implant☆99Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆97Updated 8 months ago
- Simple .NET loader for loading and executing Powershell payloads☆16Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆87Updated 3 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 4 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆153Updated last year
- ☆70Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 4 months ago
- ☆106Updated 2 months ago
- Parses Cobalt Strike malleable C2 profiles.☆56Updated last week
- SAM Dumping in C#☆48Updated 3 months ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆81Updated last month
- A care package of useful bofs for red team engagments☆55Updated 5 months ago
- ☆87Updated 11 months ago
- ☆48Updated last year
- Click Once + App Domain☆62Updated last year
- A collection of (even more) alternative shellcode callback methods in CSharp☆73Updated 6 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year