zu1k / beacon_hook_bypass_memscan
works but not work, cao!
☆24Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for beacon_hook_bypass_memscan
- SyscallLoader☆10Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- Windows Persistence Collection☆12Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 2 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆20Updated last year
- Learning notes of amazing Sliver C2 project.☆24Updated last year
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- DLL Unhooking☆12Updated 3 years ago
- ☆18Updated 3 years ago
- Thanks to @d35ha☆11Updated 3 years ago
- Windows 7/2008 R2 EoP☆13Updated 3 years ago
- Use current thread token to execute command☆15Updated 3 years ago
- Cs-Sleep-Mask-Fiber☆16Updated 2 months ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- VEH hook☆10Updated 2 years ago
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- Beacon Object Files.☆31Updated 8 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Load ssp dll golang implementation☆17Updated 2 years ago
- Shellcode antivirus evasion framework☆27Updated 3 years ago
- ☆12Updated 2 years ago
- ☆12Updated 2 years ago
- Source code RDPUploader☆18Updated 5 years ago