xpn / stego-playground
☆36Updated last year
Alternatives and similar repositories for stego-playground:
Users that are interested in stego-playground are comparing it to the libraries listed below
- in-process powershell runner for BRC4☆45Updated last year
- A pure C version of SymProcAddress☆27Updated last year
- ☆48Updated 2 years ago
- ☆59Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- ☆55Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- Sniffing files generator☆54Updated 2 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆48Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated last week
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Detect userland hooks placed by AV/EDR☆27Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆21Updated 3 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- ☆34Updated last month
- Rewrite to fit my needs☆27Updated 9 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 9 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆37Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆29Updated last year
- BOF for C2 framework☆41Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year