timwhitez / Doge-CLRLoadLinks
load assembly executable file in memory
☆41Updated last year
Alternatives and similar repositories for Doge-CLRLoad
Users that are interested in Doge-CLRLoad are comparing it to the libraries listed below
Sorting:
- ☆41Updated last year
- Fork & modify of Wireguard's Memmod☆32Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆73Updated 3 weeks ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- MSSQL CLR for pentest.☆54Updated last year
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- ☆30Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆49Updated 2 years ago
- ☆19Updated 2 years ago
- ReturnGate, just like HellsGate.☆67Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- AddDefenderExclusions Beacon Object File☆41Updated 2 years ago
- RawCopy - Golang implementation☆23Updated 2 years ago
- dump lsass☆37Updated 3 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- dump lsass tool☆38Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- Code with Windows Hacker☆12Updated 2 years ago
- Beacon compiled using clang☆70Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆51Updated 2 years ago
- Self Cleanup in post-ex job☆57Updated 10 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆24Updated 2 years ago