EvilBytecode / Amsi-Patch-Updated-2025Links
How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.
☆21Updated 3 months ago
Alternatives and similar repositories for Amsi-Patch-Updated-2025
Users that are interested in Amsi-Patch-Updated-2025 are comparing it to the libraries listed below
Sorting:
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 5 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- command control framework☆21Updated last month
- Toolkit of Projects to attack and evade Event Trace for Windows☆14Updated 3 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 10 months ago
- ☆56Updated 9 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 6 months ago
- BypassCredGuard CS BOF☆43Updated 6 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆51Updated last month
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 11 months ago
- ☆49Updated 3 weeks ago
- ☆27Updated 6 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 9 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated 11 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54Updated 2 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆43Updated last year
- ☆30Updated 4 months ago
- Mythic C2 Agent written in x64 PIC C☆81Updated 6 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆28Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 3 months ago
- Bypassing Amsi using LdrLoadDll☆45Updated 7 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 5 months ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year
- Linux Sleep Obfuscation☆105Updated last year
- remote process injections using pool party techniques☆66Updated last month
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago