A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique
What is the ProcessusT/CobaltStrikeBypassDefender GitHub project? Description: "A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique". Written in C++. Explain what it does, its main use cases, key features, and who would benefit from using it.
Question is copied to clipboard — paste it after the AI opens.
Clone via HTTPS
Clone via SSH
Download ZIP
Download master.zipReport bugs or request features on the CobaltStrikeBypassDefender issue tracker:
Open GitHub Issues