rvrsh3ll / PELoader
Load PE via XML Attribute
☆29Updated 4 years ago
Alternatives and similar repositories for PELoader:
Users that are interested in PELoader are comparing it to the libraries listed below
- ☆50Updated 4 years ago
- HookDetection☆44Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆54Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆38Updated 4 years ago
- ☆35Updated 4 years ago
- x64 version☆30Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆26Updated 5 years ago
- Using syscall to load shellcode, Evasion techniques☆26Updated 3 years ago
- MappingInjection via csharp☆37Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- Inject shellcode into process via "EarlyBird"☆24Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆53Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆63Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆72Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆42Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- Loads shellcode from a resource file.☆21Updated 5 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆18Updated 2 years ago
- My personal shellcode loader☆32Updated last year
- One gate to all syscalls!☆23Updated 2 years ago
- ShellCodeLoader via DInvoke☆52Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆32Updated 2 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 5 years ago