roadwy / SideloadFinderLinks
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆53Updated 2 years ago
Alternatives and similar repositories for SideloadFinder
Users that are interested in SideloadFinder are comparing it to the libraries listed below
Sorting:
- Beacon compiled using clang☆71Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- ☆42Updated 2 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated 2 years ago
- Evasive loader to bypass static detection☆59Updated last year
- Self Cleanup in post-ex job☆59Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated 2 years ago
- use aswArPot.sys to kill process☆68Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- An implementation of an indirect system call☆131Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆53Updated 2 years ago
- dump lsass tool☆38Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆56Updated last year
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆55Updated 2 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- ☆19Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- A Simple PoC☆21Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- 一个普通的BOF用来BypassUAC☆22Updated last year