zimawhit3 / DynimicGhostWritingLinks
Windows x64 Process Injection via Ghostwriting with Dynamic Configuration
☆29Updated 3 years ago
Alternatives and similar repositories for DynimicGhostWriting
Users that are interested in DynimicGhostWriting are comparing it to the libraries listed below
Sorting:
- ☆29Updated 2 years ago
- ☆43Updated last year
- Beacon Object Files (not Buffer Overflows)☆55Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆36Updated 9 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆21Updated 2 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆20Updated 11 months ago
- ☆25Updated 2 years ago
- ☆48Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- ☆27Updated 4 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- Dump Teams conversations☆19Updated 3 years ago
- ☆23Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last month
- ☆25Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- LoadLibrary for offensive operations☆33Updated 3 years ago