smokeme / asar-backdoorLinks
☆33Updated 9 months ago
Alternatives and similar repositories for asar-backdoor
Users that are interested in asar-backdoor are comparing it to the libraries listed below
Sorting:
- Sliver agent rewritten in C++☆49Updated last year
- BypassCredGuard CS BOF☆48Updated 11 months ago
- UDC2 implementation that provides an ICMP C2 channel☆111Updated last month
- A VSCode plugin to assist with BOF development.☆37Updated last year
- ☆49Updated 8 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆50Updated 6 months ago
- ☆57Updated last year
- CVE-2024-40711-exp☆42Updated last year
- ☆32Updated 11 months ago
- Beacon Object Files (not Buffer Overflows)☆57Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆57Updated this week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- Beacon Object File (BOF) Template☆60Updated last year
- ☆52Updated 3 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 10 months ago
- ☆100Updated 2 years ago
- x64 version☆36Updated 4 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆106Updated 4 months ago
- ☆73Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆124Updated last month
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 6 months ago
- ☆100Updated last year
- ☆56Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago