A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.
☆128Jan 28, 2026Updated last month
Alternatives and similar repositories for execute-assembly-pico
Users that are interested in execute-assembly-pico are comparing it to the libraries listed below
Sorting:
- ☆50Jun 4, 2025Updated 9 months ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- find dll base addresses without PEB WALK☆160Jul 13, 2025Updated 7 months ago
- ☆64Dec 19, 2024Updated last year
- Crystal Palace library for proxying Nt API calls via the Threadpool☆100Oct 18, 2025Updated 4 months ago
- ☆17Jun 16, 2025Updated 8 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆152Nov 23, 2025Updated 3 months ago
- Arsenal of modules to beacon postex☆94Feb 18, 2026Updated 2 weeks ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- Linker for Beacon Object Files☆159Feb 22, 2026Updated last week
- POC tool to convert CobaltStrike BOF files to raw shellcode☆220Nov 5, 2021Updated 4 years ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- An example reference design for a proposed BOF PE☆200Jan 23, 2026Updated last month
- ☆48Dec 5, 2025Updated 2 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆137Apr 18, 2025Updated 10 months ago
- Position-independent Reflective Loader for macOS☆118Feb 19, 2026Updated last week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A BOF that's a BOF Loader and more☆198Jan 17, 2026Updated last month
- ☆126Jan 23, 2025Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆146Dec 6, 2025Updated 2 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- Beacon Object File (BOF) Template☆64Feb 6, 2026Updated 3 weeks ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆122Dec 23, 2025Updated 2 months ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 10 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- ☆49Apr 9, 2025Updated 10 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago