Hubbl3 / ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
☆12Updated 9 months ago
Alternatives and similar repositories for ThreatCheck:
Users that are interested in ThreatCheck are comparing it to the libraries listed below
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆34Updated 4 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- ☆47Updated 2 years ago
- Excel Add In Payload Generator☆10Updated last year
- ☆15Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆23Updated 3 months ago
- ☆26Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Rewrite to fit my needs☆27Updated 7 months ago
- ☆58Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 6 months ago
- in-process powershell runner for BRC4☆44Updated last year
- Threadless Injection Payload Toolkit☆11Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago