CyberSecurityUP / Offensive-Windows-Drivers-DevelopmentLinks
☆133Updated 3 months ago
Alternatives and similar repositories for Offensive-Windows-Drivers-Development
Users that are interested in Offensive-Windows-Drivers-Development are comparing it to the libraries listed below
Sorting:
- Injecting DLL into LSASS at boot☆118Updated last month
- kernel callback removal (Bypassing EDR Detections)☆177Updated 3 months ago
- Ghosting-AMSI☆191Updated 2 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- ☆124Updated last week
- ☆142Updated 7 months ago
- Stage 0☆161Updated 6 months ago
- ☆107Updated 7 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆110Updated 6 months ago
- A PoC for Early Cascade process injection technique.☆182Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆193Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- ☆155Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆83Updated 3 weeks ago
- Sleep obfuscation☆228Updated 6 months ago
- early cascade injection PoC based on Outflanks blog post☆219Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆147Updated 4 months ago
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago
- ☆177Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆110Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- A Mythic Agent written in PIC C.☆190Updated 4 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆70Updated last week
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago
- ☆136Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆205Updated 6 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆118Updated last month