trustedsec / TCS_InjectionTechniquesLinks
☆16Updated last year
Alternatives and similar repositories for TCS_InjectionTechniques
Users that are interested in TCS_InjectionTechniques are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆27Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 6 months ago
- A care package of useful bofs for red team engagments☆55Updated 8 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Updated 4 months ago
- Sleep Obfuscation☆45Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- ☆59Updated last year
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- Rewrite to fit my needs☆30Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆26Updated 2 months ago
- ☆47Updated 2 years ago
- Flexible C# shellcode runner☆39Updated 3 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆25Updated 10 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- ☆39Updated 4 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago