smokeme / asar-backdoorLinks
☆33Updated 10 months ago
Alternatives and similar repositories for asar-backdoor
Users that are interested in asar-backdoor are comparing it to the libraries listed below
Sorting:
- UDC2 implementation that provides an ICMP C2 channel☆115Updated 2 months ago
- Sliver agent rewritten in C++☆49Updated last year
- BypassCredGuard CS BOF☆48Updated last year
- A VSCode plugin to assist with BOF development.☆37Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- ☆49Updated 8 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Updated last year
- ☆53Updated 4 months ago
- ☆33Updated last year
- ☆50Updated 6 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆126Updated last month
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago
- ☆57Updated 2 years ago
- ☆75Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Updated 2 years ago
- Beacon Object File (BOF) Template☆61Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆47Updated last week
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- CVE-2024-40711-exp☆42Updated last year
- ☆100Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- ☆49Updated 7 months ago
- ☆100Updated last year
- ☆57Updated 2 years ago
- x64 version☆36Updated 4 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 3 months ago
- ☆37Updated 2 years ago