ricardojoserf / SharpNadoLinks
Repository to gather the .NET malware I will be developing
☆18Updated 5 months ago
Alternatives and similar repositories for SharpNado
Users that are interested in SharpNado are comparing it to the libraries listed below
Sorting:
- Rewrite to fit my needs☆31Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆67Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Misery Loader to bypass modern EDR solutions☆15Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Proxy function calls through the thread pool with ease☆29Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆55Updated 5 months ago
- Internal Monologue BOF☆20Updated 8 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆41Updated 2 months ago
- HTML smuggling is not an evil, it can be useful☆13Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆70Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆14Updated last year
- BOF for C2 framework☆43Updated 10 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 9 months ago
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- ☆42Updated last month
- Bunch of BOF files☆34Updated 2 months ago
- Click Once + App Domain☆63Updated last year
- Local SYSTEM auth trigger for relaying - X☆138Updated last month
- Random BOFs for LDAP tradecraft☆58Updated last week
- Post-Ex BOF tooling for Hannibal☆24Updated 10 months ago
- ☆60Updated last year
- A python script that automates a C2 Profile build☆44Updated 2 weeks ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 7 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year