CyberSecurityUP / AV-EDR-Evasion-Practical-Techniques-CourseView external linksLinks
☆58Jun 28, 2025Updated 7 months ago
Alternatives and similar repositories for AV-EDR-Evasion-Practical-Techniques-Course
Users that are interested in AV-EDR-Evasion-Practical-Techniques-Course are comparing it to the libraries listed below
Sorting:
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated last year
- ☆13Jul 26, 2025Updated 6 months ago
- ☆81Apr 28, 2025Updated 9 months ago
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- ☆30Aug 24, 2025Updated 5 months ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆144Jun 9, 2025Updated 8 months ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last week
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Nov 26, 2025Updated 2 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆39Nov 1, 2021Updated 4 years ago
- ☆650Feb 6, 2026Updated last week
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆74Jan 24, 2026Updated 3 weeks ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Jul 30, 2023Updated 2 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Oct 1, 2025Updated 4 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Aug 4, 2024Updated last year
- Developing an open source Windows EDR written in C & C++ & C#☆25Jun 27, 2025Updated 7 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- ☆23Aug 4, 2024Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Nov 22, 2021Updated 4 years ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- ☆25Nov 24, 2025Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 9 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- ☆59Nov 13, 2024Updated last year
- Inject VBA macro code into Excel documents☆30Oct 22, 2015Updated 10 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Dec 18, 2024Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆110Jan 3, 2022Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago