obscuritylabs / PeFixup
PE File Blessing - To continue or not to continue
☆86Updated 5 years ago
Alternatives and similar repositories for PeFixup:
Users that are interested in PeFixup are comparing it to the libraries listed below
- Resolve syscall numbers at runtime for all Windows versions.☆60Updated 2 months ago
- A tool to create COM class/interface relationships in neo4j☆47Updated 2 years ago
- In 'n Out - See what goes in and comes out of PEs☆33Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆58Updated 2 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆100Updated last year
- Python 3 server used to control SK8RAT implant☆35Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆50Updated 3 years ago
- Smart Card PIN swiping DLL☆77Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Updated 5 years ago
- ☆55Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆62Updated 5 years ago
- C++ function that will automagically unhook a specified Windows API☆60Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆47Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆120Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 3 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆24Updated 3 years ago
- ☆47Updated 4 years ago
- Initial Commit of Coresploit☆55Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated 9 months ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆70Updated 4 years ago