Post-Ex BOF tooling for Hannibal
☆24Nov 20, 2024Updated last year
Alternatives and similar repositories for hbin_template
Users that are interested in hbin_template are comparing it to the libraries listed below
Sorting:
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- ☆33Mar 19, 2025Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 6 months ago
- ☆30May 23, 2024Updated last year
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆30Feb 19, 2026Updated last week
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆199Dec 30, 2025Updated 2 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- early cascade injection PoC based on Outflanks blog post☆237Nov 7, 2024Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- Position-independent Reflective Loader for macOS☆118Feb 19, 2026Updated last week
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆137Aug 31, 2025Updated 6 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 10 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆199Jun 17, 2025Updated 8 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆97Mar 20, 2023Updated 2 years ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- ☆36Aug 21, 2024Updated last year
- An example reference design for a proposed BOF PE☆200Jan 23, 2026Updated last month