Creation and removal of Defender path exclusions and exceptions in C#.
☆32Nov 1, 2023Updated 2 years ago
Alternatives and similar repositories for DefenderPathExclusions
Users that are interested in DefenderPathExclusions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆83Nov 1, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Lockless BOF☆79May 2, 2025Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- ☆103Oct 7, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆159Nov 7, 2023Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆216Oct 9, 2022Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆255Jun 25, 2023Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Feb 2, 2026Updated 3 months ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- List the ETW provider(s) in the registration table of a process.☆82Sep 20, 2023Updated 2 years ago
- ☆128Jun 28, 2023Updated 2 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆175Mar 15, 2023Updated 3 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆141Sep 14, 2024Updated last year
- Shellcode Reductio Entropy Tools☆74Oct 8, 2023Updated 2 years ago
- ☆177Mar 27, 2023Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆257Jun 6, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- AV bypass while you sip your Chai!☆224May 17, 2024Updated 2 years ago
- The code is a pingback to the Dark Vortex blog:☆190Jan 26, 2023Updated 3 years ago
- DLL sideloading/proxying with Nim!☆174Dec 4, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆116Aug 29, 2022Updated 3 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆289Apr 17, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 3 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆203Dec 27, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆64Apr 4, 2026Updated last month
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆261Jan 21, 2024Updated 2 years ago
- ☆131Jun 28, 2023Updated 2 years ago
- ☆347Nov 10, 2025Updated 6 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago