o1mate / DLLProxLinks
Automatic DLL comment link generation and explaination of the DLL Proxying techniques
☆10Updated 4 years ago
Alternatives and similar repositories for DLLProx
Users that are interested in DLLProx are comparing it to the libraries listed below
Sorting:
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 6 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 5 years ago
- ☆18Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 6 years ago
- ☆19Updated 5 years ago
- Extended Process List (Search functionality)☆29Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 4 years ago
- LoadLibrary for offensive operations☆33Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- ☆24Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- leaking net-ntlm with webdav☆26Updated 4 years ago
- treafik fronted c2 examples☆25Updated 5 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆14Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- ☆25Updated 3 years ago
- ☆48Updated 5 years ago
- ☆39Updated 4 years ago
- ☆31Updated 5 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Updated 5 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Updated 5 years ago
- ☆48Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Updated 5 years ago