EvilBytecode / EvilByte-Remote-AMSI-BypassLinks
Bypasses AMSI protection through remote memory patching and parsing technique.
☆50Updated 4 months ago
Alternatives and similar repositories for EvilByte-Remote-AMSI-Bypass
Users that are interested in EvilByte-Remote-AMSI-Bypass are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆96Updated last month
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆76Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆68Updated 3 weeks ago
- Modern PIC implant for Windows (64 & 32 bit)☆103Updated last month
- COM-based DLL Surrogate Injection☆37Updated last week
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- ☆108Updated 10 months ago
- ☆58Updated 10 months ago
- A small How-To on creating your own weaponized WSL file☆115Updated last month
- ☆53Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- Shellcode loader☆94Updated 9 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆45Updated 5 months ago
- BOF to decrypt Signal Desktop chat logs☆71Updated 6 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 7 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 2 months ago
- Impersonate Tokens using only NTAPI functions☆80Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 7 months ago
- remote process injections using pool party techniques☆66Updated 2 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆128Updated 2 months ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 7 months ago
- "Service-less" driver loading☆161Updated 9 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆114Updated 3 weeks ago
- shell code example☆62Updated 3 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 10 months ago