Blazz3 / MalDev-AV-EDR-Evasion-for-Pentesters
MalDev & AV-EDR Evasion for Pentesters
☆14Updated last year
Alternatives and similar repositories for MalDev-AV-EDR-Evasion-for-Pentesters:
Users that are interested in MalDev-AV-EDR-Evasion-for-Pentesters are comparing it to the libraries listed below
- Offensive Router for Windows Pivoting☆15Updated 11 months ago
- Cobalt Strike BOFS☆16Updated last year
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- Tool to aid in dumping LSASS process remotely☆35Updated 5 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 4 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 9 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- ☆45Updated 2 months ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- All my POC related to malware development☆11Updated 8 months ago
- Research into WinSxS binaries and finding hijackable paths☆25Updated 8 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- PoC-Malware-TTPs☆49Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 4 months ago
- ☆51Updated last month
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated 11 months ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- ☆16Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 3 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- Unhook Ntdll.dll, Go & C++.☆13Updated 6 months ago
- ☆27Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Golang Implementation of Hell's gate☆16Updated last year