0xJs / EnumEDR-sLinks
Enumerate active EDR's on the system
☆40Updated last week
Alternatives and similar repositories for EnumEDR-s
Users that are interested in EnumEDR-s are comparing it to the libraries listed below
Sorting:
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago
- ☆42Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆50Updated 2 months ago
- ☆90Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆78Updated 5 months ago
- Execute commands in other Sessions☆90Updated last year
- Windows Persistence IT-Security☆103Updated 4 months ago
- A BOF to enumerate system process, their protection levels, and more.☆117Updated 8 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 10 months ago
- Create Anti-Copy DRM Malware☆60Updated 11 months ago
- ☆53Updated 7 months ago
- To audit the security of read-only domain controllers☆117Updated last year
- ☆108Updated 5 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 4 months ago
- A Mythic agent for Windows written in C☆131Updated 2 weeks ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Updated 6 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆85Updated 3 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 10 months ago
- Convert your shellcode into an ASCII string☆103Updated last month
- Lateral Movement☆124Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- A C# port from Invoke-GhostTask☆117Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆84Updated 2 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆45Updated 3 weeks ago
- Terminate AV/EDR leveraging BYOVD attack☆89Updated 4 months ago
- Abuse leaked token handles.☆132Updated last year
- ☆97Updated 11 months ago