zblurx / impersonate-rs
Rusty Impersonate
☆91Updated last year
Related projects: ⓘ
- Simple BOF to read the protection level of a process☆101Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆80Updated 3 months ago
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- Implant drop-in for EDR testing☆126Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- ☆61Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆66Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆71Updated 5 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆84Updated last year
- ☆83Updated 2 years ago
- ☆65Updated this week
- ☆101Updated 4 months ago
- ☆116Updated last year
- ☆135Updated 2 years ago
- Find DLLs with RWX section☆74Updated last year
- ☆90Updated 6 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆109Updated 10 months ago
- ☆87Updated 2 years ago
- ☆70Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆110Updated 3 months ago
- Tool for playing with Windows Access Token manipulation.☆50Updated last year
- Detect EDR's exceptions by inspecting processes' loaded modules☆120Updated 6 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆69Updated 7 months ago
- ☆140Updated this week
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- ☆62Updated last month
- Do some DLL SideLoading magic☆72Updated 11 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- ☆132Updated last year