raykaryshyn / FakeTLSLinks
Client/server code that impersonates TLS 1.3 to disguise C2 activity.
☆70Updated 2 years ago
Alternatives and similar repositories for FakeTLS
Users that are interested in FakeTLS are comparing it to the libraries listed below
Sorting:
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- It stinks☆102Updated 3 years ago
- bring your own vulnerable driver☆100Updated 2 years ago
- ☆50Updated 2 years ago
- An implementation of an indirect system call☆129Updated last year
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆127Updated 3 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆67Updated 2 years ago
- ☆96Updated 3 years ago
- Windows Defender VDM lua collections☆47Updated 2 years ago
- ☆114Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated last month
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆102Updated last year
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆103Updated 2 years ago
- Load static-compiled PE from remote server.☆63Updated 3 years ago
- x64 version☆36Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆54Updated 4 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- ☆166Updated 3 years ago
- ☆142Updated 2 years ago
- A basic C2 framework written in C☆60Updated last year
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆43Updated 3 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆40Updated 3 years ago
- ☆56Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆80Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago
- Repo that holds random POCs☆51Updated last year