reveng007 / reveng_loaderLinks
C# loader capable of running stage-1 from remote url, file path as well as file share
☆16Updated 2 years ago
Alternatives and similar repositories for reveng_loader
Users that are interested in reveng_loader are comparing it to the libraries listed below
Sorting:
- One gate to all syscalls!☆23Updated 3 years ago
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Updated 3 years ago
- Akame is an open-source, shellcode loader written in C++17☆20Updated 5 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Halos Gate-based NTAPI Unhooker☆51Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆56Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- ☆11Updated 2 years ago
- Bypass Windows defender syscall☆19Updated 4 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- ☆56Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- ☆13Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- The Web UI for Antnium☆27Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- C# API for Nidhogg rootkit☆19Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago