Offensive-Panda / DV_NEWLinks
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
☆51Updated last year
Alternatives and similar repositories for DV_NEW
Users that are interested in DV_NEW are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆77Updated last year
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Impersonate Tokens using only NTAPI functions☆79Updated 4 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆65Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 6 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆22Updated last week
- Do some DLL SideLoading magic☆86Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated last year
- ☆110Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆157Updated 8 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- Rewrite to fit my needs☆30Updated last year
- Sniffing files generator☆59Updated 6 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆65Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 4 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆49Updated 3 months ago
- ☆34Updated 5 months ago
- ☆112Updated 9 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆79Updated 5 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Proxy function calls through the thread pool with ease☆29Updated 6 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆20Updated 2 years ago
- A small How-To on creating your own weaponized WSL file☆113Updated last month