Offensive-Panda / on-disk-detection-bypass
Direct syscalls Injection to bypass AV/EDR
☆11Updated 9 months ago
Alternatives and similar repositories for on-disk-detection-bypass:
Users that are interested in on-disk-detection-bypass are comparing it to the libraries listed below
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 4 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆81Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- A care package of useful bofs for red team engagments☆54Updated 2 months ago
- ☆78Updated last year
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆51Updated 2 years ago
- ProcExp Driver (Ab)use☆20Updated 2 years ago
- Rewrite to fit my needs☆27Updated 7 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆52Updated 2 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Simple .NET loader for loading and executing Powershell payloads☆16Updated 3 years ago
- ☆93Updated 6 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- ☆36Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆50Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- Threadless shellcode injection tool☆63Updated 7 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 6 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆123Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆46Updated 9 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago