Kudaes / Bin-Finder
Detect EDR's exceptions by inspecting processes' loaded modules
☆130Updated last year
Alternatives and similar repositories for Bin-Finder:
Users that are interested in Bin-Finder are comparing it to the libraries listed below
- Rusty Impersonate☆95Updated last year
- ☆150Updated 3 months ago
- ☆133Updated last year
- Simple BOF to read the protection level of a process☆115Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆136Updated 4 months ago
- Adversary Emulation Framework☆92Updated 8 months ago
- Windows Persistence IT-Security☆90Updated 2 weeks ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- ☆103Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆167Updated last year
- Implant drop-in for EDR testing☆135Updated last year
- Do some DLL SideLoading magic☆79Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Your syscall factory☆121Updated 2 weeks ago
- ☆125Updated 6 months ago
- Tool for viewing NTDS.dit☆150Updated last week
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆141Updated 10 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆257Updated 6 months ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Lateral Movement☆123Updated last year
- AzureAD beacon object files☆117Updated 3 months ago
- ☆78Updated last year
- ☆110Updated last week
- Reuse open handles to dynamically dump LSASS.☆236Updated 11 months ago
- EDRSandblast-GodFault☆257Updated last year
- Find DLLs with RWX section☆78Updated last year
- ETW based POC to identify direct and indirect syscalls☆181Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆113Updated last year