xforcered / Being-A-Good-CLR-HostLinks
☆110Updated 5 months ago
Alternatives and similar repositories for Being-A-Good-CLR-Host
Users that are interested in Being-A-Good-CLR-Host are comparing it to the libraries listed below
Sorting:
- ☆62Updated 5 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆93Updated last month
- ForsHops☆139Updated 2 months ago
- ☆113Updated 5 months ago
- AzureAD beacon object files☆120Updated 6 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆82Updated 4 months ago
- Linker for Beacon Object Files☆116Updated this week
- ForsHops☆53Updated 2 months ago
- ☆125Updated 9 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- ☆61Updated last year
- ☆31Updated 10 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆98Updated 2 months ago
- Malware?☆70Updated 8 months ago
- shell code example☆49Updated last month
- Find DLLs with RWX section☆81Updated last year
- ☆136Updated 2 years ago
- ☆99Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆125Updated 4 months ago
- BOF with Synthetic Stackframe☆150Updated 4 months ago
- Simple BOF to read the protection level of a process☆115Updated 2 years ago
- ☆116Updated 3 months ago
- Impersonate Tokens using only NTAPI functions☆75Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆90Updated 5 months ago
- ☆155Updated 6 months ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- I have documented all of the AMSI patches that I learned till now☆72Updated 2 months ago
- ☆122Updated last year