JakubStanior / PsExclusionFinderLinks
PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user
☆12Updated last year
Alternatives and similar repositories for PsExclusionFinder
Users that are interested in PsExclusionFinder are comparing it to the libraries listed below
Sorting:
- Cortex EDR Ransomware protection Bypass☆25Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Lifetime AMSI bypass.☆35Updated 6 months ago
- Public repo of some woking evilginx phishlets☆38Updated 11 months ago
- Small project to facilitate creation of .lnk payloads☆73Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆21Updated 8 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike.☆18Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 10 months ago
- ☆26Updated 7 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated 11 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆48Updated 3 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆31Updated this week
- Proxy function calls through the thread pool with ease☆30Updated 8 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated last month
- PoC XLL builder in Python/Nim☆48Updated 2 years ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆59Updated 9 months ago
- ☆58Updated last year
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆10Updated 9 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆130Updated 3 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆39Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆88Updated 9 months ago
- ☆47Updated 2 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆19Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- ☆37Updated 7 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆21Updated 2 years ago
- Docker container for running CobaltStrike 4.7 and above☆22Updated 7 months ago