roadwy / SideloadFinderLinks
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆52Updated 2 years ago
Alternatives and similar repositories for SideloadFinder
Users that are interested in SideloadFinder are comparing it to the libraries listed below
Sorting:
- Beacon compiled using clang☆71Updated 2 years ago
- ☆43Updated 2 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- Evasive loader to bypass static detection☆59Updated last year
- Self Cleanup in post-ex job☆58Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆61Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- dump lsass tool☆38Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- use aswArPot.sys to kill process☆68Updated 3 years ago
- ☆19Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆44Updated 3 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- An implementation of an indirect system call☆131Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆57Updated 2 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- UAC_wenpon☆49Updated 3 years ago
- shadow tls client☆14Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- ☆41Updated 2 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- vehsyscall:a syscall project that may bypass EDR☆59Updated last year