HackingLZ / ExtractedDefender
☆216Updated 2 years ago
Alternatives and similar repositories for ExtractedDefender:
Users that are interested in ExtractedDefender are comparing it to the libraries listed below
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆171Updated 2 years ago
- ☆188Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆172Updated 4 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆333Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- Load any Beacon Object File using Powershell!☆250Updated 3 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆187Updated 4 years ago
- You shall pass☆259Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 3 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆208Updated 2 years ago
- ☆182Updated 2 years ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆247Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- ☆375Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆295Updated last year
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- ☆113Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆192Updated 3 years ago
- ☆208Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆129Updated 2 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- Evasive Process Hollowing Techniques☆139Updated 4 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆190Updated 2 years ago
- EDRSandblast-GodFault☆261Updated last year
- Hookers are cooler than patches.☆169Updated 3 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year