pwn1sher / uuid-loaderLinks
UUID based Shellcode loader for your favorite C2
☆86Updated 4 years ago
Alternatives and similar repositories for uuid-loader
Users that are interested in uuid-loader are comparing it to the libraries listed below
Sorting:
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- HookDetection☆45Updated 4 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆84Updated 4 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Updated 3 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 4 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆82Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆113Updated 4 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆90Updated 2 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆101Updated 3 years ago
- ☆82Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 5 years ago
- It stinks☆103Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆110Updated 2 years ago
- x64 version☆36Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆101Updated 3 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- all credits go to @mgeeky☆64Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆158Updated 4 years ago
- C++ WinRM API via Reflective DLL☆145Updated 4 years ago
- ☆50Updated 5 years ago