rasta-mouse / SpawnWith
☆106Updated 2 months ago
Alternatives and similar repositories for SpawnWith:
Users that are interested in SpawnWith are comparing it to the libraries listed below
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆56Updated this week
- ☆107Updated 2 months ago
- ☆97Updated 7 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- ☆127Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆86Updated 9 months ago
- Adversary Emulation Framework☆96Updated 8 months ago
- A Mythic agent for Windows written in C☆115Updated last week
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆73Updated last month
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆14Updated last week
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆136Updated 2 months ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago
- ☆54Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆65Updated this week
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆81Updated last week
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- ☆121Updated last year
- TokenCert☆95Updated 5 months ago
- ☆125Updated last year
- ☆52Updated 3 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆85Updated 3 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated 11 months ago
- AzureAD beacon object files☆115Updated 3 months ago
- Threadless shellcode injection tool☆63Updated 8 months ago
- ☆86Updated 11 months ago
- Impersonate Tokens using only NTAPI functions☆54Updated last week