PacktPublishing / Windows-APT-Warfare
Windows APT Warfare, published by Packt
☆69Updated 2 years ago
Alternatives and similar repositories for Windows-APT-Warfare:
Users that are interested in Windows-APT-Warfare are comparing it to the libraries listed below
- Finding secrets in kernel and user memory☆115Updated last year
- ☆113Updated 2 years ago
- ☆135Updated last year
- ☆42Updated 2 years ago
- ☆115Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆172Updated 4 years ago
- ☆139Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- ☆117Updated last year
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- ☆75Updated 2 years ago
- Simple BOF to read the protection level of a process☆115Updated last year
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆114Updated last year
- ☆105Updated 9 months ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆137Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- ☆116Updated 3 years ago
- Do some DLL SideLoading magic☆84Updated last year
- Detect strange memory regions and DLLs☆183Updated 3 years ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆129Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- ☆96Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆186Updated 2 years ago