outflanknl / macho-loader
☆65Updated 4 months ago
Alternatives and similar repositories for macho-loader:
Users that are interested in macho-loader are comparing it to the libraries listed below
- ☆96Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated 10 months ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- A cmkr based win32 shellcode template for a unified build platform and more production friendly structure/testing.☆65Updated last month
- macOS dylib stager☆26Updated this week
- A process injection technique using only thread context manipulation☆25Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- stack spoofing☆74Updated 2 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆46Updated 3 months ago
- ☆60Updated 7 months ago
- Mythic C2 Agent written in x64 PIC C☆64Updated 2 weeks ago
- BOF with Synthetic Stackframe☆58Updated this week
- ☆28Updated 7 months ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆77Updated 3 months ago
- Execute dotnet app from unmanaged process☆67Updated 2 weeks ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Threadless shellcode injection tool☆62Updated 5 months ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- ☆134Updated last year
- based on https://gitlab.com/ORCA000/snaploader☆42Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- BOF for C2 framework☆40Updated 2 months ago
- ☆28Updated 4 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆40Updated 6 months ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- ☆73Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 4 months ago