Identifies bad bytes from static analysis with any Anti-Virus scanner.
☆128Jul 5, 2024Updated last year
Alternatives and similar repositories for MultCheck
Users that are interested in MultCheck are comparing it to the libraries listed below
Sorting:
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- ☆101Oct 7, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆376Jun 22, 2025Updated 8 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- Library of BOFs to interact with SQL servers☆223Dec 3, 2025Updated 2 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- ☆210Nov 28, 2023Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆129Sep 27, 2023Updated 2 years ago
- DLL proxying for lazy people☆200Dec 1, 2025Updated 2 months ago
- ☆123Oct 9, 2023Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆546Nov 23, 2025Updated 3 months ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- ☆242May 5, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- ☆121Nov 21, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆680Oct 23, 2024Updated last year
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆371Jun 13, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆302Sep 7, 2023Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆260Jan 21, 2024Updated 2 years ago