trickster0 / UDPlantLinks
UDP implant
☆67Updated 4 years ago
Alternatives and similar repositories for UDPlant
Users that are interested in UDPlant are comparing it to the libraries listed below
Sorting:
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 4 years ago
- Command & Control server and agent written in Rust☆35Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- Another shellcode runner 🦀 🐚☆147Updated 4 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆132Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆133Updated 2 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- CobaltStrike beacon in rust☆208Updated last year
- ☆133Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 3 years ago
- Windows NTLM Authentication Backdoor☆241Updated 10 months ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆220Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Executables on Disk? Bleh 🤮☆111Updated 2 years ago
- Research project for understanding how Mimikatz work and become better at C☆124Updated 4 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆84Updated 3 years ago