thiagopeixoto / massayo
Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL
☆65Updated 2 years ago
Alternatives and similar repositories for massayo
Users that are interested in massayo are comparing it to the libraries listed below
Sorting:
- Rusty Impersonate☆95Updated last year
- ☆136Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆107Updated last year
- Detect EDR's exceptions by inspecting processes' loaded modules☆129Updated last year
- Find DLLs with RWX section☆80Updated last year
- ☆184Updated last year
- Implant drop-in for EDR testing☆138Updated last year
- Your syscall factory☆121Updated 2 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆180Updated last year
- Do some DLL SideLoading magic☆83Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆94Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated 11 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Template-based generation of shellcode loaders☆77Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆145Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆195Updated 2 years ago
- It's pointy and it hurts!☆126Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated 10 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- Simple BOF to read the protection level of a process☆114Updated 2 years ago
- Local & remote Windows DLL Proxying☆164Updated 11 months ago
- Finding secrets in kernel and user memory☆115Updated last year
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆139Updated 9 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- ☆123Updated last year
- ☆119Updated last year
- I have documented all of the AMSI patches that I learned till now☆72Updated last month