PrimitiveInjection by using Read, Write and Allocation Primitives.
☆53Jun 21, 2025Updated 9 months ago
Alternatives and similar repositories for PrimitiveInjection
Users that are interested in PrimitiveInjection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago
- ☆52May 4, 2025Updated 11 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆19Jul 21, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆230Sep 19, 2025Updated 6 months ago
- ☆59Feb 19, 2026Updated last month
- ☆17May 22, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆201Jun 17, 2025Updated 9 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- UDC2 implementation that provides an ICMP C2 channel☆120Nov 24, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bof of RegPwn by MDSec☆115Mar 15, 2026Updated 3 weeks ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆168Sep 22, 2025Updated 6 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆52Sep 10, 2025Updated 6 months ago
- ☆26Mar 24, 2026Updated 2 weeks ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- ☆183Oct 21, 2025Updated 5 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆108Feb 25, 2025Updated last year
- Position-independent Reflective Loader for macOS☆120Feb 19, 2026Updated last month
- ☆57Jan 15, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆18Jun 10, 2025Updated 9 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆62Oct 19, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell☆74Updated this week
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆115Mar 30, 2026Updated last week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A New Exploitation Technique for Visual Studio Projects☆12Nov 5, 2023Updated 2 years ago
- A reflective DLL development template for the Rust programming language☆117Nov 4, 2025Updated 5 months ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆57Jul 13, 2025Updated 8 months ago
- ☆138Jan 16, 2025Updated last year
- A simple Sleepmask BOF example☆173Nov 24, 2025Updated 4 months ago
- 针对finereportv10反序列化接口/webroot/decision/remote/design/channel进行无回显检测并提供Godzilla memshell注入功能(部分环境缺少依赖无法成功)☆23Oct 17, 2023Updated 2 years ago