HackingLZ / ExtractedDefender
☆214Updated 2 years ago
Alternatives and similar repositories for ExtractedDefender:
Users that are interested in ExtractedDefender are comparing it to the libraries listed below
- Dump the memory of any PPL with a Userland exploit chain☆332Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆169Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆166Updated 4 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆116Updated 3 years ago
- ☆186Updated 2 years ago
- You shall pass☆254Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆138Updated 2 years ago
- EDRSandblast-GodFault☆250Updated last year
- A fake AMSI Provider which can be used for persistence.☆147Updated 3 years ago
- Load any Beacon Object File using Powershell!☆246Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆288Updated last year
- ☆112Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆141Updated 3 years ago
- ☆181Updated 2 years ago
- ☆182Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆318Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆186Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆185Updated 3 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆184Updated last year
- ETW based POC to identify direct and indirect syscalls☆180Updated last year
- Remove API hooks from a Beacon process.☆267Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 2 years ago
- WTSRM☆207Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆236Updated 3 years ago
- ☆375Updated 2 years ago
- Exploitation of process killer drivers☆196Updated last year
- ☆231Updated 2 years ago
- Finding secrets in kernel and user memory☆113Updated last year
- Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs☆290Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year