Offensive-Panda / on-disk-detection-bypass
Direct syscalls Injection to bypass AV/EDR
☆11Updated 8 months ago
Alternatives and similar repositories for on-disk-detection-bypass:
Users that are interested in on-disk-detection-bypass are comparing it to the libraries listed below
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆39Updated 8 months ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆50Updated 2 years ago
- A care package of useful bofs for red team engagments☆54Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆44Updated last year
- ☆122Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆75Updated last year
- ☆79Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆50Updated last month
- Click Once + App Domain☆63Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆80Updated 3 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 4 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 3 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆56Updated last year
- ProcExp Driver (Ab)use☆20Updated 2 years ago
- ☆92Updated 4 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated last year
- Rewrite to fit my needs☆27Updated 6 months ago
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- C# havoc implant☆96Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Inject shellcode into process via "EarlyBird"☆25Updated 3 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆65Updated 2 weeks ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆45Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 10 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆44Updated 3 weeks ago
- Simple .NET loader for loading and executing Powershell payloads☆15Updated 3 years ago