ricardojoserf / SharpNadoLinks
Repository to gather the .NET malware I will be developing
☆18Updated 9 months ago
Alternatives and similar repositories for SharpNado
Users that are interested in SharpNado are comparing it to the libraries listed below
Sorting:
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 11 months ago
- Rewrite to fit my needs☆32Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- HTML smuggling is not an evil, it can be useful☆14Updated 2 years ago
- Proxy function calls through the thread pool with ease☆31Updated 10 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆73Updated 5 months ago
- Internal Monologue BOF☆78Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆16Updated last year
- Bunch of BOF files☆37Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Post-Ex BOF tooling for Hannibal☆24Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Updated 5 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- Random BOFs for LDAP tradecraft☆71Updated 3 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆71Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆17Updated 6 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- A pure C version of SymProcAddress☆30Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆43Updated 6 months ago
- A process injection technique using only thread context manipulation☆39Updated 2 years ago
- Click Once + App Domain☆64Updated 2 years ago
- Lateral Movement via the .NET Profiler☆84Updated last year
- ☆35Updated last year
- ☆61Updated 2 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆46Updated this week