CyberSecurityUP / Offensive-Windows-Drivers-DevelopmentLinks
☆160Updated 5 months ago
Alternatives and similar repositories for Offensive-Windows-Drivers-Development
Users that are interested in Offensive-Windows-Drivers-Development are comparing it to the libraries listed below
Sorting:
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆149Updated last week
- A PoC for Early Cascade process injection technique.☆189Updated 6 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆125Updated 2 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 7 months ago
- Injecting DLL into LSASS at boot☆132Updated 3 months ago
- kernel callback removal (Bypassing EDR Detections)☆184Updated 4 months ago
- ☆142Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated 2 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated last year
- early cascade injection PoC based on Outflanks blog post☆227Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 5 months ago
- Ghosting-AMSI☆207Updated 3 months ago
- Stage 0☆163Updated 7 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆113Updated 7 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆248Updated 3 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆85Updated 3 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆81Updated last month
- ☆155Updated 7 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆282Updated this week
- Evade EDR's the simple way, by not touching any of the API's they hook.☆149Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆75Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆135Updated 6 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆261Updated last year
- Sleep obfuscation☆230Updated 7 months ago
- A Mythic Agent written in PIC C.☆196Updated 6 months ago
- ☆144Updated 9 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆203Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- Windows rootkit designed to work with BYOVD exploits☆204Updated 6 months ago