PaulNorman01 / ForensiaLinks
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
☆778Updated 2 years ago
Alternatives and similar repositories for Forensia
Users that are interested in Forensia are comparing it to the libraries listed below
Sorting:
- ☆715Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆831Updated last year
- EDR Lab for Experimentation Purposes☆1,373Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,191Updated 2 years ago
- PowerShell Ransomware Simulator with C2 Server☆490Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆809Updated last year
- kill anti-malware protected processes ( BYOVD ) ( Microsoft Won )☆966Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,764Updated 11 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,024Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆510Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,315Updated 2 weeks ago
- Real fucking shellcode encryptor & obfuscator tool☆961Updated last week
- Simulate the behavior of AV/EDR for malware development training.☆545Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆715Updated 5 months ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆384Updated this week
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆451Updated 11 months ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆629Updated 7 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,195Updated last month
- ↕️🤫 Stealth redirector for your red team operation security☆716Updated 3 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆719Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 7 months ago
- a tool to help operate in EDRs' blind spots☆762Updated 11 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆610Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆567Updated 9 months ago
- A centralized and enhanced memory analysis platform☆505Updated 3 months ago
- ☆471Updated 11 months ago
- Useful C2 techniques and cheat sheets learned from engagements☆553Updated last month
- ☆511Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆599Updated 6 months ago