pard0p / Self-Cleaning-PICO-LoaderLinks
Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload execution.
☆47Updated last month
Alternatives and similar repositories for Self-Cleaning-PICO-Loader
Users that are interested in Self-Cleaning-PICO-Loader are comparing it to the libraries listed below
Sorting:
- ☆49Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- converts sRDI compatible dlls to shellcode☆33Updated 11 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 2 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 11 months ago
- Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictabili…☆102Updated last week
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆120Updated 3 weeks ago
- A process injection technique using only thread context manipulation☆39Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- ☆100Updated 2 years ago
- Threadless shellcode injection tool☆67Updated last year
- ☆99Updated last year
- ☆127Updated last year
- ☆98Updated last year
- ☆22Updated 10 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆97Updated 2 months ago
- ☆35Updated last year
- Shellcode Loader Utilizing ETW Events☆67Updated 10 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Arsenal of modules to beacon postex formats like BOF/Shellcode including: dotnet in memory execution, lateral moviment (scm, winrm, dcom,…☆91Updated last month
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆180Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 7 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆71Updated last month
- Post-Ex BOF tooling for Hannibal☆24Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago