roadwy / SideloadFinder
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆51Updated 2 years ago
Alternatives and similar repositories for SideloadFinder
Users that are interested in SideloadFinder are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆45Updated 2 years ago
- ☆26Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- ☆40Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- vehsyscall:a syscall project that may bypass EDR☆59Updated last year
- A Simple PoC☆21Updated 11 months ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Self Cleanup in post-ex job☆55Updated 8 months ago
- load assembly executable file in memory☆41Updated last year
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆34Updated 4 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆42Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆51Updated 9 months ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year
- ☆47Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆23Updated 11 months ago
- ☆19Updated 2 years ago
- ☆23Updated 3 weeks ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- A nim implementation of sRDI☆18Updated last year
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆43Updated last year
- Load shellcode via syscall☆53Updated 3 years ago