PrimitiveInjection by using Read, Write and Allocation Primitives.
☆53Jun 21, 2025Updated 8 months ago
Alternatives and similar repositories for PrimitiveInjection
Users that are interested in PrimitiveInjection are comparing it to the libraries listed below
Sorting:
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆117Oct 6, 2025Updated 5 months ago
- ☆52May 4, 2025Updated 10 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 4 months ago
- Bof of RegPwn by MDSec☆72Updated this week
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆228Sep 19, 2025Updated 6 months ago
- ☆59Feb 19, 2026Updated last month
- ☆17May 22, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn …☆199Jun 17, 2025Updated 9 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- UDC2 implementation that provides an ICMP C2 channel☆116Nov 24, 2025Updated 3 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆168Sep 22, 2025Updated 5 months ago
- ☆26Nov 25, 2025Updated 3 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- ☆176Oct 21, 2025Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Position-independent Reflective Loader for macOS☆119Feb 19, 2026Updated last month
- ☆57Jan 15, 2024Updated 2 years ago
- ☆17Jun 10, 2025Updated 9 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 10 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- A reflective DLL development template for the Rust programming language☆116Nov 4, 2025Updated 4 months ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- A simple Sleepmask BOF example☆171Nov 24, 2025Updated 3 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 8 months ago
- ☆139Jan 16, 2025Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- 针对finereportv10反序列化接口/webroot/decision/remote/design/channel进行无回显检测并提供Godzilla memshell注入功能(部分环境缺少依赖无法成功)☆24Oct 17, 2023Updated 2 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year