☆97Jan 21, 2025Updated last year
Alternatives and similar repositories for Being-A-Good-CLR-Host
Users that are interested in Being-A-Good-CLR-Host are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆268Oct 16, 2024Updated last year
- ForsHops☆60Mar 25, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- A BOF that runs unmanaged PEs inline☆698Oct 23, 2024Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆52Mar 30, 2026Updated last month
- ☆36Jan 23, 2025Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆108Feb 25, 2025Updated last year
- ☆20Jul 23, 2023Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆140Dec 20, 2022Updated 3 years ago
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- COM ViewLogger — new malware keylogging technique☆407Jan 6, 2025Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Process injection alternative☆407Sep 6, 2024Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆317Mar 31, 2025Updated last year
- ☆414Dec 8, 2024Updated last year
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆203Jun 6, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Bypass LSA protection using the BYODLL technique☆178Sep 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- ☆68Dec 19, 2024Updated last year
- Reverse engineering winapi function loadlibrary.☆242Apr 17, 2023Updated 3 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆63Nov 8, 2024Updated last year
- ☆102Oct 7, 2023Updated 2 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆35Apr 28, 2025Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆108Apr 18, 2025Updated last year
- Mentally ill EtwTi parser☆70Jan 11, 2026Updated 3 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆379Apr 19, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- TypeLib persistence technique☆143Oct 22, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago