PacktPublishing / Windows-APT-Warfare
Windows APT Warfare, published by Packt
☆67Updated 2 years ago
Alternatives and similar repositories for Windows-APT-Warfare:
Users that are interested in Windows-APT-Warfare are comparing it to the libraries listed below
- ☆105Updated 8 months ago
- ☆112Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- ☆133Updated last year
- ☆114Updated last year
- It's pointy and it hurts!☆124Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆113Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Do some DLL SideLoading magic☆79Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- ☆107Updated last year
- Simple BOF to read the protection level of a process☆115Updated last year
- ☆72Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆142Updated 4 years ago
- ☆42Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- ☆84Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆136Updated 2 years ago
- Nim process hollowing loader☆56Updated 7 months ago
- ☆136Updated 2 years ago
- Find DLLs with RWX section☆78Updated last year
- Python module for running BOFs☆70Updated last year
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆186Updated last year
- ☆112Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆120Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 11 months ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆82Updated 3 years ago