xenoscr / SysWhispers2Links
AV/EDR evasion via direct system calls.
☆108Updated 2 years ago
Alternatives and similar repositories for SysWhispers2
Users that are interested in SysWhispers2 are comparing it to the libraries listed below
Sorting:
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- POC tools for exploring SMB over QUIC protocol☆130Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆171Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Updated 4 years ago
- Collection of CobaltStrike beacon object files☆105Updated 3 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- Beacon Object File PoC implementation of KillDefender☆235Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Updated 2 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆224Updated 6 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- In-memory token vault BOF for Cobalt Strike☆149Updated 3 years ago
- ☆88Updated 3 years ago
- A simple BOF that frees UDRLs☆122Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Updated 4 years ago
- ☆59Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Updated 3 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆145Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆101Updated 4 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- ☆143Updated 2 years ago
- ☆152Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆127Updated 3 years ago