☆121Nov 21, 2024Updated last year
Alternatives and similar repositories for CloudInject
Users that are interested in CloudInject are comparing it to the libraries listed below
Sorting:
- ☆216Mar 26, 2024Updated last year
- ☆190Nov 21, 2024Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Aug 21, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- ☆100Sep 1, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆281Sep 18, 2024Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated 2 years ago
- ☆160Jan 27, 2025Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- Position-independent Reflective Loader for macOS☆112Feb 19, 2026Updated last week
- ☆124May 12, 2021Updated 4 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- Python utility that generates "imageless" QR codes in various formats☆137Aug 10, 2024Updated last year
- ☆242May 5, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆220Nov 5, 2021Updated 4 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆672Aug 15, 2025Updated 6 months ago
- ☆164Dec 30, 2022Updated 3 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆232Feb 12, 2025Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year