xpn / stego-playgroundLinks
☆35Updated last year
Alternatives and similar repositories for stego-playground
Users that are interested in stego-playground are comparing it to the libraries listed below
Sorting:
- in-process powershell runner for BRC4☆46Updated last year
- ☆59Updated last year
- ☆48Updated 2 years ago
- EvtPsst☆55Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆56Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆47Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Sniffing files generator☆59Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆35Updated 3 months ago
- Permanently disable EDRs as local admin☆89Updated last month
- Find DLLs with RWX section☆81Updated 2 years ago
- ☆34Updated 4 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- A pure C version of SymProcAddress☆29Updated last year
- BOF for C2 framework☆41Updated 8 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆37Updated last month
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆55Updated 8 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago