MythicAgents / poseidon
Poseidon is a Golang agent targeting Linux and macOS
☆146Updated this week
Alternatives and similar repositories for poseidon:
Users that are interested in poseidon are comparing it to the libraries listed below
- Apply a divide and conquer approach to bypass EDRs☆279Updated last year
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆166Updated last year
- (Demo) 3rd party agent for Havoc☆138Updated last year
- ☆198Updated 2 months ago
- ☆300Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆310Updated last year
- A Python gRPC Client Library for Sliver☆69Updated last week
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆325Updated 9 months ago
- ☆220Updated last year
- Patch AMSI and ETW☆236Updated 11 months ago
- Simple EDR implementation to demonstrate bypass☆172Updated 4 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆319Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 4 months ago
- Native Syscalls Shellcode Injector☆266Updated last year
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆261Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆227Updated last month
- Hookers are cooler than patches.☆170Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated last year
- A Nim implementation of reflective PE-Loading from memory☆278Updated 7 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆254Updated last year
- Your syscall factory☆121Updated last month
- Beacon Object File Loader☆286Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆218Updated 2 years ago
- miscellaneous scripts and programs☆240Updated 3 months ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆364Updated 2 years ago
- EDRSandblast-GodFault☆260Updated last year
- Dump the memory of any PPL with a Userland exploit chain☆333Updated 2 years ago