ofasgard / execute-assembly-picoLinks
A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.
☆52Updated this week
Alternatives and similar repositories for execute-assembly-pico
Users that are interested in execute-assembly-pico are comparing it to the libraries listed below
Sorting:
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆163Updated 2 months ago
- Linker for Beacon Object Files☆128Updated last week
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆134Updated 8 months ago
- Threadless shellcode injection tool☆67Updated last year
- ☆124Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- ☆98Updated last year
- ForsHops☆58Updated 7 months ago
- ☆100Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆104Updated 5 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆95Updated 3 months ago
- TypeLib persistence technique☆135Updated last year
- ☆45Updated 4 months ago
- ☆81Updated 9 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- A BOF that's a BOF Loader☆115Updated last week
- ☆123Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆146Updated 3 months ago
- ☆119Updated 9 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆68Updated last year
- converts sRDI compatible dlls to shellcode☆32Updated 9 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- Bypassing Amsi using LdrLoadDll☆47Updated 9 months ago
- COM-based DLL Surrogate Injection☆125Updated last month
- Updated version of a long known self deletion technique to work with 24H2.☆61Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆158Updated last month
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆49Updated 4 months ago