EvilBytecode / EvilByte-Remote-AMSI-BypassLinks
Bypasses AMSI protection through remote memory patching and parsing technique.
☆54Updated 8 months ago
Alternatives and similar repositories for EvilByte-Remote-AMSI-Bypass
Users that are interested in EvilByte-Remote-AMSI-Bypass are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆156Updated 2 months ago
- ☆108Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 5 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month
- Commandline spoofing on Windows☆92Updated 2 months ago
- ☆59Updated last year
- ☆55Updated 8 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated 3 weeks ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 5 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆80Updated last week
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Updated 5 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 6 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated last year
- A collection of position independent coding resources☆107Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- shell code example☆67Updated last month