racoten / BetterNetLoader
A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints
☆26Updated this week
Alternatives and similar repositories for BetterNetLoader:
Users that are interested in BetterNetLoader are comparing it to the libraries listed below
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- ☆92Updated 4 months ago
- ☆19Updated 5 months ago
- Click Once + App Domain☆63Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 2 months ago
- ☆50Updated 3 weeks ago
- Threadless shellcode injection tool☆62Updated 5 months ago
- Rewrite to fit my needs☆27Updated 6 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆77Updated 3 months ago
- ☆61Updated 2 weeks ago
- Execute dotnet app from unmanaged process☆67Updated 3 weeks ago
- Cobalt Strike UDRL for memory scanner evasion.☆36Updated last year
- BOF with Synthetic Stackframe☆77Updated this week
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆55Updated last year
- Mythic C2 Agent written in x64 PIC C☆64Updated 2 weeks ago
- Section-based payload obfuscation technique for x64☆59Updated 5 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆90Updated 11 months ago
- ☆40Updated this week
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆50Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- ☆96Updated last year
- ☆47Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated 10 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated 3 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 3 months ago
- Lateral Movement via the .NET Profiler☆75Updated last month
- A care package of useful bofs for red team engagments☆53Updated last month