Pinned Repositories
CloneProcess
Clone running process with ZwCreateProcess
CopyCat
Simple rapper for Mimikatz, bypass Defender
Core
Core bypass Windows Defender and execute any binary converted to shellcode
CoreClass
Mimikatz embedded as classes
HideCode
Hide code from dnSpy and other C# spying tools
NewShell
Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode
Upsilon
Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used
WinBoost
Execute Mimikatz with different technique
WinSpoof
Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code
Zeta
Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger
mobdk's Repositories
mobdk/CopyCat
Simple rapper for Mimikatz, bypass Defender
mobdk/Upsilon
Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used
mobdk/Zeta
Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger
mobdk/CloneProcess
Clone running process with ZwCreateProcess
mobdk/WinBoost
Execute Mimikatz with different technique
mobdk/Core
Core bypass Windows Defender and execute any binary converted to shellcode
mobdk/HideCode
Hide code from dnSpy and other C# spying tools
mobdk/CoreClass
Mimikatz embedded as classes
mobdk/NewShell
Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode
mobdk/WinSpoof
Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code
mobdk/Sigma
Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx
mobdk/winNoise
Execute embedded Mimikatz
mobdk/CallBack
Execute Mimikatz in shellcode format, uses native API VirtualAlloc and EnumSystemGeoID
mobdk/zCore
Optimized version, Nt/ZwProtectVirtualMemory has been removed with every syscall.
mobdk/FiberShellcodeSyscall
Using syscall when possible, ZwAllocateVirtualMemory, ZwProtectVirtualMemory and ZwWriteVirtualMemory
mobdk/Files
mobdk/WinTimer
Wrapper for Mimikatz with delayed execution
mobdk/MimiRunner
Run Mimikatz with ReactOS cmd.exe
mobdk/NewShellCS
Execute reverse shell without cmd.exe and uses syscalls from C#
mobdk/RemoteCat
mobdk/DLLloaderCS
Load 32bit .DLL payload fra C#
mobdk/Epsilon
In this PoC I am addressing the timer issue that exist in Defender
mobdk/APCinjectCS
Simple shellcode injetion with APC and syscalls
mobdk/HijackCS
Hijack your own process or other, use syscall NtWriteVirtualMemory and NtAllocateVirtualMemory to stay undetected
mobdk/Omega
Use syscalls ZwCreateSection and ZwMapViewOfSection and GetDelegateForFunctionPointer
mobdk/TCPClientReverseShellCS
C# reverse shell using TCPClient
mobdk/InstallutilInject
Execute .dll with MS InstallUtil.exe
mobdk/ProcessFinder
Find process and startup arguments with syscalls
mobdk/DllHijackCS
.DLL based hijack
mobdk/FiberShellcode
Execute shellcode with Fiber