Blazz3 / MalDev-AV-EDR-Evasion-for-PentestersView external linksLinks
MalDev & AV-EDR Evasion for Pentesters
☆20Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for MalDev-AV-EDR-Evasion-for-Pentesters
Users that are interested in MalDev-AV-EDR-Evasion-for-Pentesters are comparing it to the libraries listed below
Sorting:
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Command line & PPID spoofing☆29Apr 15, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 3 weeks ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- 《智能投顾》读书笔记☆12May 23, 2019Updated 6 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- 🔑 WinPass11 WinService is a tool for loading keys into the registry on startup with the use of Windows Services.☆13Jun 29, 2021Updated 4 years ago
- ☆11Jan 4, 2026Updated last month
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Feb 11, 2026Updated last week
- ☆13Jun 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago