reveng007 / reveng_loaderLinks
C# loader capable of running stage-1 from remote url, file path as well as file share
☆15Updated 2 years ago
Alternatives and similar repositories for reveng_loader
Users that are interested in reveng_loader are comparing it to the libraries listed below
Sorting:
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆51Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆83Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆11Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Small POC for process ghosting☆40Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆33Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Updated 4 years ago
- ☆13Updated 2 years ago
- Bypass Windows defender syscall☆19Updated 4 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆60Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆91Updated 4 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 8 months ago
- ☆30Updated 5 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- ☆15Updated 3 years ago