vilewired / XenoStealerLibLinks
This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too
☆11Updated last year
Alternatives and similar repositories for XenoStealerLib
Users that are interested in XenoStealerLib are comparing it to the libraries listed below
Sorting:
- ☆30Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆41Updated 5 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆44Updated 7 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Updated 2 months ago
- Collection of self-made Red Team tools that have come in handy☆12Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Updated 2 years ago
- Caeser Cipher your shellcode!☆21Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Beacon Object Files.☆36Updated last year
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Updated 8 months ago
- x64 version☆36Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 4 years ago
- ☆60Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Updated 3 years ago
- ☆49Updated last month
- Cobalt Strike Get clipboard plugin☆15Updated 2 years ago
- ProcExp Driver (Ab)use☆22Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Updated 3 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Updated 11 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago