plackyhacker / DynamicEarlyBird
An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.
☆11Updated last year
Alternatives and similar repositories for DynamicEarlyBird:
Users that are interested in DynamicEarlyBird are comparing it to the libraries listed below
- Halos Gate-based NTAPI Unhooker☆49Updated 2 years ago
- Extracting Syscall Stub, Modernized☆61Updated 2 years ago
- ProcessHollowing via csharp☆12Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆50Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆44Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Inject shellcode into process via "EarlyBird"☆25Updated 3 years ago
- ☆43Updated last week
- A care package of useful bofs for red team engagments☆54Updated last month
- Unhook DLL via cleaning the DLL 's .text section☆8Updated 3 years ago
- Rewrite to fit my needs☆27Updated 6 months ago
- ☆22Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆30Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆26Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆80Updated 3 years ago
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆17Updated 9 months ago
- Bypassing Amsi using LdrLoadDll☆32Updated 3 weeks ago
- Implementation of SpoolSample without rDLL☆31Updated 4 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated 2 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆26Updated 2 years ago
- One gate to all syscalls!☆23Updated 2 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 2 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆45Updated 8 months ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆22Updated last year
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11Updated 8 months ago