Load the evilDLL from socket connection without touch disk
-
Updated
Aug 27, 2021 - C++
Load the evilDLL from socket connection without touch disk
This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built in Sleep() call. Most of the structure e.g. Sleep hook, shellcode exec etc. are taken from mgeeky's https://github.com/mgeeky/ShellcodeFluctuation.
Add a description, image, and links to the cobaltstrike topic page so that developers can more easily learn about it.
To associate your repository with the cobaltstrike topic, visit your repo's landing page and select "manage topics."