xforcered / Detect-HooksLinks
Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR
☆101Updated 3 years ago
Alternatives and similar repositories for Detect-Hooks
Users that are interested in Detect-Hooks are comparing it to the libraries listed below
Sorting:
- ☆94Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆119Updated 3 years ago
- ☆57Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆96Updated 3 years ago
- Collection of CobaltStrike beacon object files☆104Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆144Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆102Updated 4 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 3 years ago
- ☆70Updated 4 years ago
- ☆65Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 8 months ago
- ☆141Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- ☆146Updated 2 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- ☆94Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆90Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆80Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Updated 2 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- UI for creating LNKs☆104Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago