tothi / stager_libpeconv
A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading
☆83Updated 2 years ago
Alternatives and similar repositories for stager_libpeconv:
Users that are interested in stager_libpeconv are comparing it to the libraries listed below
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆90Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆117Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Implant drop-in for EDR testing☆135Updated last year
- Collection of Beacon Object Files (BOFs) for shells and lols☆114Updated 3 years ago
- ☆61Updated 2 years ago
- ☆56Updated 3 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆86Updated 2 years ago
- ☆134Updated last year
- ☆142Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆91Updated 3 years ago
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆139Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆101Updated 2 years ago
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆103Updated last year
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆85Updated 2 years ago
- Remove API hooks from a Beacon process.☆56Updated 3 years ago
- ☆55Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆89Updated 2 years ago
- Find DLLs with RWX section☆76Updated last year
- Python module for running BOFs☆70Updated last year
- D/Invoke implementation in Nim☆100Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆140Updated 9 months ago
- ☆115Updated last year