tijme / nimplant-beacon-position-independent-c-codeLinks
A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.
☆59Updated 3 months ago
Alternatives and similar repositories for nimplant-beacon-position-independent-c-code
Users that are interested in nimplant-beacon-position-independent-c-code are comparing it to the libraries listed below
Sorting:
- ☆40Updated this week
- ☆52Updated 5 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆53Updated 5 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 4 months ago
- ☆55Updated 7 months ago
- remote process injections using pool party techniques☆60Updated 3 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 11 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 4 months ago
- ☆29Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- BOF to decrypt Signal Desktop chat logs☆65Updated 3 months ago
- BOF for C2 framework☆41Updated 6 months ago
- Linker for Beacon Object Files☆70Updated this week
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated 2 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆49Updated last month
- Sliver agent rewritten in C++☆44Updated 9 months ago
- Execute dotnet app from unmanaged process☆75Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 7 months ago
- ☆30Updated 2 months ago
- ☆96Updated 9 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆37Updated 8 months ago
- SAM Dumping in C#☆48Updated 4 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆39Updated 3 weeks ago
- A process injection technique using only thread context manipulation☆38Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 3 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆29Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year