timwhitez / Doge-RL
Reflective DLL injection Execution
☆19Updated 2 years ago
Related projects: ⓘ
- DLL Unhooking☆12Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆41Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆31Updated last year
- ☆38Updated 11 months ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆30Updated 3 years ago
- ☆27Updated this week
- impersonate trustedinstaller by fiddling with tokens☆16Updated 3 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆16Updated 2 years ago
- ShellCodeLoader via DInvoke☆48Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆42Updated last year
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆41Updated 2 years ago
- ☆39Updated last year
- ☆37Updated this week
- A simple hidden vnc.☆31Updated 3 years ago
- A Simple PoC☆18Updated 3 months ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆24Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆28Updated 2 months ago
- ☆18Updated 2 years ago
- desktop screenshot☆29Updated last year
- Cobaltstrike BOF to unhook any Nt api☆14Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆35Updated last year
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆29Updated 2 years ago
- x64 version☆30Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆31Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆14Updated last year
- Thanks to @d35ha☆10Updated 3 years ago
- A flexible tool that creates a minidump of the LSASS process☆12Updated 2 years ago