Orange-Cyberdefense / EDRSnowblastLinks
This project is an EDRSandblast fork, adding some features and custom pieces of code.
☆23Updated 2 years ago
Alternatives and similar repositories for EDRSnowblast
Users that are interested in EDRSnowblast are comparing it to the libraries listed below
Sorting:
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- ☆32Updated 9 months ago
- ☆47Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- Sleep Obfuscation☆45Updated 3 years ago
- ☆37Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- miscellaneous codes☆35Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆43Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- ☆24Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆30Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆84Updated 4 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- ☆56Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆44Updated 2 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆59Updated 4 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago