Blazz3 / MalDev-AV-EDR-Evasion-for-PentestersLinks
MalDev & AV-EDR Evasion for Pentesters
☆20Updated 2 years ago
Alternatives and similar repositories for MalDev-AV-EDR-Evasion-for-Pentesters
Users that are interested in MalDev-AV-EDR-Evasion-for-Pentesters are comparing it to the libraries listed below
Sorting:
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆94Updated last year
- A C2 framework built for my bachelors thesis☆55Updated last month
- A collection of PoCs for different injection techniques on Windows!☆48Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- ☆59Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- ☆55Updated 6 months ago
- A small red team course☆40Updated 2 years ago
- ☆26Updated 2 years ago
- ☆103Updated 10 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 8 months ago
- ☆37Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Updated last month
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Vast.ai Password Kracking☆92Updated 2 months ago
- ☆91Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Cobalt Strike BOFS☆16Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- ☆55Updated last year
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago