ElusiveMice
Stealth loader
A custom reflective loader designed to evade detection and provide stealth capabilities in Cobalt Strike
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
427 stars
11 watching
73 forks
Language: C
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| A collection of battle-tested PowerShell scripts for Cobalt Strike 4.0+ | 1,048 |
| An advanced in-memory evasion technique for hiding malicious code from scanners by fluctuating shellcode's memory protection and encrypting its contents. | 957 |
| A collection of tools to generate and modify shellcode profiles to evade detection in Cobalt Strike | 384 |
| A tool for loading shellcode into Cobalt Strike | 279 |
| An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 |
| A tool designed to bypass common anti-malware measures by loading malicious Cobalt Strike shellcodes into infected systems. | 121 |
| An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
| A Cobalt Strike plugin package with various exploit and password cracking tools. | 672 |
| Scripts and tools for probing and exploiting Cobalt Strike environments | 7 |
| Creates reflective PE files that can be executed in memory without being written to disk | 1,208 |
| A tool for integrating Cobalt Strike payloads with ScareCrow to evade antivirus detection and improve evasion capabilities. | 457 |
| A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
| Automates payload development and deployment using Python classes to interact with Cobalt Strike and other tools | 118 |
| A library that loads environment variables from .env files in Solidity scripts and tests | 158 |