tijme / nimplant-beacon-position-independent-c-codeLinks
A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.
☆63Updated 8 months ago
Alternatives and similar repositories for nimplant-beacon-position-independent-c-code
Users that are interested in nimplant-beacon-position-independent-c-code are comparing it to the libraries listed below
Sorting:
- ☆52Updated 4 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- ☆53Updated last month
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 8 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 9 months ago
- BOF for C2 framework☆44Updated 11 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆86Updated 7 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 6 months ago
- remote process injections using pool party techniques☆66Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- ☆82Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆98Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 7 months ago
- ☆100Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated last year
- Impersonate Tokens using only NTAPI functions☆80Updated 6 months ago
- ☆45Updated 4 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆56Updated 4 months ago
- ☆109Updated 8 months ago
- in-process powershell runner for BRC4☆47Updated last year
- ☆58Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆74Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆103Updated 3 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆53Updated 6 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 5 months ago
- ☆31Updated last year