roadwy / SideloadFinder
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆50Updated last year
Alternatives and similar repositories for SideloadFinder:
Users that are interested in SideloadFinder are comparing it to the libraries listed below
- A Simple PoC☆20Updated 9 months ago
- ☆45Updated 11 months ago
- Beacon compiled using clang☆63Updated 2 years ago
- Evasive loader to bypass static detection☆57Updated last year
- ☆39Updated last year
- A Cobalt Strike memory evasion loader for redteamers☆97Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- ☆26Updated last year
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆79Updated 2 years ago
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆33Updated 4 months ago
- ☆14Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 2 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆41Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- more conveniently Visual-Studio-BOF-template☆60Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆49Updated 7 months ago
- An implementation of an indirect system call☆120Updated last year
- Fork & modify of Wireguard's Memmod☆31Updated last year
- dump lsass tool☆39Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆47Updated 3 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- ☆21Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆38Updated 2 years ago