zu1k / beacon_hook_bypass_memscanLinks
works but not work, cao!
☆24Updated 4 years ago
Alternatives and similar repositories for beacon_hook_bypass_memscan
Users that are interested in beacon_hook_bypass_memscan are comparing it to the libraries listed below
Sorting:
- SyscallLoader☆11Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 5 years ago
- RDI implementation in Nim☆64Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 3 years ago
- Shellcode antivirus evasion framework☆27Updated 4 years ago
- ☆52Updated 5 years ago
- ☆18Updated 4 years ago
- Beacon Object Files.☆37Updated last year
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- ☆74Updated 4 years ago
- Use current thread token to execute command☆15Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆15Updated 4 years ago
- ☆14Updated 4 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 4 years ago
- StenographyShellcodeLoader☆43Updated 5 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Updated 3 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 5 years ago
- A flexible tool that creates a minidump of the LSASS process☆14Updated 3 years ago
- ☆46Updated 7 months ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 4 years ago
- ☆13Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆54Updated 9 months ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 3 years ago
- Shellcode runner in Rust☆33Updated 5 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- ☆17Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago