tehstoni / tryharder
C++ Staged Shellcode Loader with Evasion capabilities.
☆82Updated 5 months ago
Alternatives and similar repositories for tryharder:
Users that are interested in tryharder are comparing it to the libraries listed below
- ☆53Updated 4 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆117Updated 5 months ago
- .bin file to shellcode convertor☆33Updated 8 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆80Updated last month
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 4 months ago
- C# havoc implant☆98Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆120Updated last year
- Create Anti-Copy DRM Malware☆54Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Construct the payload at runtime using an array of offsets☆62Updated 8 months ago
- ☆85Updated 9 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 2 months ago
- ☆108Updated 3 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Lateral Movement via the .NET Profiler☆80Updated 3 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 11 months ago
- ☆94Updated 6 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆62Updated 2 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆30Updated 6 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆69Updated 10 months ago