☆107Feb 12, 2025Updated last year
Alternatives and similar repositories for Awesome-EDR-Evasion
Users that are interested in Awesome-EDR-Evasion are comparing it to the libraries listed below
Sorting:
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- ☆687Feb 28, 2026Updated 2 weeks ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆496Feb 13, 2023Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆140May 22, 2025Updated 9 months ago
- ☆251Mar 29, 2025Updated 11 months ago
- ☆26Aug 11, 2025Updated 7 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- ☆28Sep 9, 2024Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 11 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- ☆104Sep 5, 2023Updated 2 years ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆137Jul 21, 2025Updated 7 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,060Mar 10, 2026Updated last week
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- ☆41Mar 12, 2025Updated last year
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆28Oct 15, 2025Updated 5 months ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆103Mar 12, 2026Updated last week
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- ☆46Dec 23, 2024Updated last year
- OSWE, OSEP, OSED, OSEE☆3,782Jan 2, 2026Updated 2 months ago
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 9 months ago
- My Notes about Penetration Testing☆730Jan 17, 2026Updated 2 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆30Feb 12, 2024Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆424Sep 29, 2025Updated 5 months ago
- AV bypass while you sip your Chai!☆223May 17, 2024Updated last year
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆438May 22, 2025Updated 9 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago