winsecurity / AMSI-Bypass-HWBPLinks
☆26Updated 4 months ago
Alternatives and similar repositories for AMSI-Bypass-HWBP
Users that are interested in AMSI-Bypass-HWBP are comparing it to the libraries listed below
Sorting:
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 3 weeks ago
- Enable or Disable TokenPrivilege(s)☆15Updated last year
- ☆41Updated 10 months ago
- bring your own clean ntdll (or other MS dlls)☆28Updated 5 months ago
- BOF for C2 framework☆44Updated last year
- ☆32Updated last year
- ☆59Updated last year
- use python on windows with full submodule support without installation☆30Updated 11 months ago
- custom impacket mssqlclient☆26Updated 2 years ago
- Easy peasy file uploads☆33Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Updated 10 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆130Updated 3 weeks ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated 10 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 10 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆36Updated 2 weeks ago
- Sniffing files generator☆59Updated 10 months ago
- ☆35Updated 5 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- rust port of pspy with support for process monitoring over dbus☆35Updated 6 months ago
- ☆54Updated 7 months ago
- ☆46Updated 3 weeks ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆90Updated 11 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Updated 9 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆65Updated this week
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year