CymulateResearch / Blindside
Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms
☆117Updated 2 years ago
Alternatives and similar repositories for Blindside:
Users that are interested in Blindside are comparing it to the libraries listed below
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆90Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆61Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- ☆112Updated 2 years ago
- ☆142Updated 2 years ago
- A simple BOF that frees UDRLs☆116Updated 2 years ago
- Implant drop-in for EDR testing☆135Updated last year
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- ☆134Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- ☆123Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆91Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year
- ☆78Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆101Updated 2 years ago
- Do some DLL SideLoading magic☆79Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated last year
- ☆88Updated 2 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆85Updated 2 years ago
- Sleep Obfuscation☆43Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated last year