raykaryshyn / FakeTLSLinks
Client/server code that impersonates TLS 1.3 to disguise C2 activity.
☆73Updated 3 years ago
Alternatives and similar repositories for FakeTLS
Users that are interested in FakeTLS are comparing it to the libraries listed below
Sorting:
- An implementation of an indirect system call☆131Updated 2 years ago
- ☆50Updated 3 years ago
- shellcode-loaders and beacon-loaders☆72Updated 2 years ago
- It stinks☆103Updated 3 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- bring your own vulnerable driver☆113Updated 2 years ago
- ☆58Updated 3 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆113Updated 3 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Updated 3 years ago
- ☆119Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Updated 2 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆143Updated 3 years ago
- x64 version☆36Updated 4 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Windows Defender VDM lua collections☆48Updated 3 years ago
- ☆169Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆62Updated 4 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆46Updated 4 years ago
- A basic C2 framework written in C☆60Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- ☆101Updated 3 years ago
- ☆89Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 4 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Updated 4 years ago
- ☆152Updated 3 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Updated 3 years ago
- Repo that holds random POCs☆52Updated last year