rbmm / SC_DEMO
☆110Updated last week
Alternatives and similar repositories for SC_DEMO:
Users that are interested in SC_DEMO are comparing it to the libraries listed below
- ☆146Updated 7 months ago
- ☆103Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆183Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆172Updated last month
- ☆96Updated 2 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆149Updated last week
- ☆150Updated 3 months ago
- AzureAD beacon object files☆117Updated 3 months ago
- A Mythic Agent written in PIC C.☆184Updated last month
- ☆125Updated 6 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆257Updated 6 months ago
- BOF with Synthetic Stackframe☆137Updated last month
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- ☆104Updated this week
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- Shellcode loader☆77Updated 4 months ago
- ☆207Updated 5 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆93Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- ☆121Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆175Updated last year
- A collection of position independent coding resources☆67Updated last month
- A PoC for Early Cascade process injection technique.☆164Updated last month
- A Mythic agent for Windows written in C☆101Updated this week
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 9 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆101Updated last month
- TypeLib persistence technique☆108Updated 5 months ago