plackyhacker / Peruns-FartLinks
Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.
☆111Updated 3 years ago
Alternatives and similar repositories for Peruns-Fart
Users that are interested in Peruns-Fart are comparing it to the libraries listed below
Sorting:
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Updated 4 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆99Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated 2 years ago
- UUID based Shellcode loader for your favorite C2☆86Updated 3 years ago
- ☆70Updated 4 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- ☆57Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆87Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- ☆94Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- RDPThief donut shellcode inject into mstsc☆87Updated 4 years ago
- ☆88Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 3 years ago
- UI for creating LNKs☆106Updated 4 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 2 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆98Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆107Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆81Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- Injects shellcode into remote processes using direct syscalls☆79Updated 4 years ago