zimnyaa / beepsyscallLinks
An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.
☆16Updated 2 years ago
Alternatives and similar repositories for beepsyscall
Users that are interested in beepsyscall are comparing it to the libraries listed below
Sorting:
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- OSED Practice binary☆24Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Parent Process ID Spoofing, coded in CGo.☆24Updated 8 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- ☆12Updated 3 years ago
- ☆20Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Command and Control Framework using powershell implants☆35Updated 7 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- ☆17Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- ☆31Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Updated 5 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago