CodeXTF2 / evasion-adventures-filesLinks
Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"
☆28Updated 2 years ago
Alternatives and similar repositories for evasion-adventures-files
Users that are interested in evasion-adventures-files are comparing it to the libraries listed below
Sorting:
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- ☆20Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Updated last year
- ☆40Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- ☆18Updated 9 months ago
- A VSCode plugin to assist with BOF development.☆37Updated 10 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated last year
- ☆30Updated 2 years ago
- ☆27Updated 5 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated 2 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- ☆30Updated 3 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆43Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- ☆25Updated 3 years ago
- ☆26Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- The Web UI for Antnium☆27Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- A simple BOF (Beacon Object File) to search files in the system☆14Updated last year