roadwy / SideloadFinder
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
☆51Updated last year
Alternatives and similar repositories for SideloadFinder:
Users that are interested in SideloadFinder are comparing it to the libraries listed below
- A Simple PoC☆21Updated 10 months ago
- ☆26Updated last year
- ☆40Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆36Updated 5 months ago
- Self Cleanup in post-ex job☆51Updated 6 months ago
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- ☆47Updated 11 months ago
- ☆22Updated last year
- Fork & modify of Wireguard's Memmod☆32Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆65Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- use aswArPot.sys to kill process☆67Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆49Updated 8 months ago
- ☆15Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆43Updated 2 years ago
- Beacon compiled using clang☆63Updated 2 years ago
- dump lsass tool