plackyhacker / AMSI-Bypass
Another AMSI bypass - but in C++.
☆23Updated last year
Alternatives and similar repositories for AMSI-Bypass:
Users that are interested in AMSI-Bypass are comparing it to the libraries listed below
- A simple Nim stager (w/ fiber execution)☆16Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- ☆27Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- ☆16Updated 4 months ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Run python from a single exe☆34Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- Remove API hooks from a Beacon process.☆13Updated 3 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆18Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- Bunch of BOF files☆27Updated 2 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year