CyberSecurityUP / Offensive-Windows-Drivers-DevelopmentLinks
☆160Updated 5 months ago
Alternatives and similar repositories for Offensive-Windows-Drivers-Development
Users that are interested in Offensive-Windows-Drivers-Development are comparing it to the libraries listed below
Sorting:
- ☆155Updated 2 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆130Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆153Updated 3 weeks ago
- A PoC for Early Cascade process injection technique.☆191Updated 6 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆282Updated 3 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆229Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆196Updated 5 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆179Updated last year
- Injecting DLL into LSASS at boot☆135Updated 3 months ago
- kernel callback removal (Bypassing EDR Detections)☆187Updated 5 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 8 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆85Updated 2 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆116Updated 8 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆137Updated 7 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆86Updated 4 months ago
- Stage 0☆163Updated 8 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆151Updated 6 months ago
- Sleep obfuscation☆231Updated 8 months ago
- Ghosting-AMSI☆211Updated 4 months ago
- Generate an Alphabetical Polymorphic Shellcode☆97Updated last week
- ☆157Updated 8 months ago
- ☆145Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆150Updated last year
- ☆108Updated 9 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 4 months ago
- Windows rootkit designed to work with BYOVD exploits☆205Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated 5 months ago