trickster0 / UDPlantLinks
UDP implant
โ67Updated 4 years ago
Alternatives and similar repositories for UDPlant
Users that are interested in UDPlant are comparing it to the libraries listed below
Sorting:
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.โ93Updated 4 years ago
- Another shellcode runner ๐ฆ ๐โ147Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashesโ142Updated 3 years ago
- Windows NTLM Authentication Backdoorโ241Updated 11 months ago
- ๐๐ชฒ Malleable C2 profiles parser and assembler written in golangโ65Updated last year
- Command & Control server and agent written in Rustโ35Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Tokenโฆโ162Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniquesโ221Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callbackโ67Updated 3 years ago
- AV/EDR evasion via direct system calls.โ108Updated 2 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Serviceโ136Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypassโ134Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrityโ32Updated 3 years ago
- Shellcode loader designed for evasion. Coded in Rust.โ133Updated 2 years ago
- Cobalt Strike BOF Files with Nim!โ86Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injectionโ251Updated 4 years ago
- Simple windows rpc server for research purposes onlyโ83Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bโฆโ142Updated 3 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabsโ150Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.โ84Updated 2 years ago
- Research project for understanding how Mimikatz work and become better at Cโ124Updated 4 years ago
- Executables on Disk? Bleh ๐คฎโ111Updated 2 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero dayโ52Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.โ100Updated 3 years ago
- CobaltStrike beacon in rustโ208Updated last year
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcodeโ105Updated 2 years ago
- โ163Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.โ54Updated 4 years ago
- Dumping LSASS with a duplicated handle from custom LSA pluginโ203Updated 3 years ago
- A Golang implant that uses Discord as a C2 team serverโ65Updated last year