☆61Jun 28, 2025Updated 8 months ago
Alternatives and similar repositories for AV-EDR-Evasion-Practical-Techniques-Course
Users that are interested in AV-EDR-Evasion-Practical-Techniques-Course are comparing it to the libraries listed below
Sorting:
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated last year
- ☆14Jul 26, 2025Updated 7 months ago
- ☆82Apr 28, 2025Updated 10 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- ☆29Aug 24, 2025Updated 6 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆146Jun 9, 2025Updated 9 months ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- ☆19Sep 17, 2025Updated 5 months ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Nov 26, 2025Updated 3 months ago
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆35Feb 21, 2026Updated 2 weeks ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆40Nov 1, 2021Updated 4 years ago
- ☆682Feb 28, 2026Updated last week
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Jul 30, 2023Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Sep 8, 2025Updated 6 months ago
- ☆21Sep 12, 2025Updated 5 months ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Oct 1, 2025Updated 5 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆55Feb 23, 2026Updated 2 weeks ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Aug 4, 2024Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆267Apr 8, 2025Updated 11 months ago
- Developing an open source Windows EDR written in C & C++ & C#☆27Feb 23, 2026Updated 2 weeks ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Nov 22, 2021Updated 4 years ago
- ☆25Nov 24, 2025Updated 3 months ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆89Jan 24, 2026Updated last month
- ☆25Aug 4, 2024Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- PEN-300 collection to help you on your exam.☆697Feb 25, 2026Updated last week
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago