EspressoCake / Defender_Exclusions-BOF
A BOF to determine Windows Defender exclusions.
☆243Updated last year
Alternatives and similar repositories for Defender_Exclusions-BOF:
Users that are interested in Defender_Exclusions-BOF are comparing it to the libraries listed below
- Useful Cobalt Strike BOFs found or used during engagements☆138Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆152Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆230Updated 2 years ago
- Remove API hooks from a Beacon process.☆268Updated 3 years ago
- ☆154Updated last year
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆129Updated 2 years ago
- BOF combination of KillDefender and Backstab☆166Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- Patch AMSI and ETW☆237Updated 10 months ago
- A BOF to automate common persistence tasks for red teamers☆273Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆167Updated last year
- Beacon Object File PoC implementation of KillDefender☆219Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆177Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆158Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆293Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆102Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆236Updated 11 months ago
- ☆140Updated last year
- You shall pass☆256Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆178Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆200Updated 3 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆140Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆209Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆174Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆239Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆169Updated 2 years ago
- ☆116Updated last year