roadwy / SideloadFinderLinks
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆51Updated 2 years ago
Alternatives and similar repositories for SideloadFinder
Users that are interested in SideloadFinder are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- A Simple PoC☆21Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- ☆41Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- dump lsass tool☆39Updated 2 years ago
- ☆47Updated last year
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆49Updated 2 years ago
- ☆15Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆45Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆33Updated 3 months ago
- Beacon compiled using clang☆69Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆83Updated this week
- Self Cleanup in post-ex job☆56Updated 9 months ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆43Updated 3 years ago
- Silently Install Chrome Extension For Persistence☆88Updated 11 months ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆51Updated 4 months ago
- Beacon Object Files.☆35Updated last year
- load assembly executable file in memory☆41Updated last year
- Load shellcode via syscall☆54Updated 3 years ago