HackingLZ / ExtractedDefenderLinks
☆217Updated 3 years ago
Alternatives and similar repositories for ExtractedDefender
Users that are interested in ExtractedDefender are comparing it to the libraries listed below
Sorting:
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆176Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- ☆190Updated 2 years ago
- Dump the memory of any PPL with a Userland exploit chain☆334Updated 2 years ago
- Load any Beacon Object File using Powershell!☆254Updated 3 years ago
- ☆208Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆188Updated 3 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆192Updated 4 years ago
- You shall pass☆261Updated 2 years ago
- ☆183Updated 2 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- Koppeling x Metatwin x LazySign☆212Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- Remove API hooks from a Beacon process.☆270Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆193Updated 3 years ago
- Detect strange memory regions and DLLs☆184Updated 3 years ago
- ☆113Updated 3 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- ☆184Updated 2 years ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆249Updated 3 years ago
- ☆142Updated 2 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆300Updated last year
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆262Updated 4 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 3 years ago