thiagopeixoto / mystique-self-injectionView external linksLinks
An improvement and a different approach to Mockingjay Self-Injection.
☆35May 21, 2024Updated last year
Alternatives and similar repositories for mystique-self-injection
Users that are interested in mystique-self-injection are comparing it to the libraries listed below
Sorting:
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- ☆92May 15, 2024Updated last year
- ☆42Feb 18, 2025Updated 11 months ago
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 6 months ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Mar 4, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated 11 months ago
- ☆121Nov 21, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- ☆24Feb 1, 2025Updated last year
- ☆150Mar 22, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆105Jan 24, 2024Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Jun 15, 2024Updated last year
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- Reflective DLL Injection Made Bella☆248Jan 6, 2025Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 2 months ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆31Jul 26, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ☆19Sep 17, 2025Updated 5 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- ☆144May 22, 2024Updated last year
- ☆57Apr 19, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year