trustedsec / TCS_InjectionTechniquesLinks
☆16Updated 2 years ago
Alternatives and similar repositories for TCS_InjectionTechniques
Users that are interested in TCS_InjectionTechniques are comparing it to the libraries listed below
Sorting:
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆29Updated 5 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- One gate to all syscalls!☆23Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
- ☆60Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Remove API hooks from a Beacon process.☆14Updated 4 years ago
- maldev obviously☆27Updated 6 months ago
- ☆11Updated 2 years ago
- API Hammering with C++20☆49Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- ☆47Updated 2 years ago
- Modify managed functions from unmanaged code☆52Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆44Updated 2 years ago