xforcered / ForsHopsLinks
ForsHops
☆139Updated 2 months ago
Alternatives and similar repositories for ForsHops
Users that are interested in ForsHops are comparing it to the libraries listed below
Sorting:
- AzureAD beacon object files☆120Updated 6 months ago
- ☆113Updated 5 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆93Updated last month
- BOF with Synthetic Stackframe☆150Updated 4 months ago
- ☆116Updated 3 months ago
- ☆110Updated 5 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆98Updated 2 months ago
- ☆180Updated 2 months ago
- Adversary Emulation Framework☆114Updated 11 months ago
- ☆125Updated 9 months ago
- Enumerate Domain Users Without Authentication☆36Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- A Mythic agent for Windows written in C☆126Updated 3 weeks ago
- Impersonate Tokens using only NTAPI functions☆75Updated 2 months ago
- ☆132Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 6 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆90Updated 5 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- ☆108Updated 3 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆50Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆125Updated 4 months ago
- ☆82Updated 10 months ago
- ☆137Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆82Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- A python script that automates a C2 Profile build☆42Updated 2 months ago
- ☆122Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆147Updated 2 months ago
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 6 months ago