MalDev & AV-EDR Evasion for Pentesters
☆20Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for MalDev-AV-EDR-Evasion-for-Pentesters
Users that are interested in MalDev-AV-EDR-Evasion-for-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆19Jun 28, 2025Updated 10 months ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- ☆13Mar 28, 2024Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 3 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Command line & PPID spoofing☆30Apr 15, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CLI to control Pioneer CDJ devices☆11Mar 22, 2025Updated last year
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserver☆12Dec 27, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆16Jan 10, 2024Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆15Mar 21, 2022Updated 4 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆14Jun 28, 2023Updated 2 years ago
- A Stress Testing Tool for Darknet Sites: Opens up Infinite Tabs with the URL that you pass in the UI, an HTTP/HTTPS GET attack.☆11Oct 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fuzz 403/401ing endpoints for bypasses☆11Aug 14, 2020Updated 5 years ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 3 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆28May 8, 2026Updated last week
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆21Jun 27, 2022Updated 3 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 11 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆28Sep 9, 2024Updated last year
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- ☆24Feb 3, 2021Updated 5 years ago
- ☆13Jan 4, 2026Updated 4 months ago
- ☆705May 13, 2026Updated last week
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 7 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated 2 years ago