RedTeamOperations / Journey-to-McAfee
☆113Updated 2 years ago
Alternatives and similar repositories for Journey-to-McAfee:
Users that are interested in Journey-to-McAfee are comparing it to the libraries listed below
- Simple EDR implementation to demonstrate bypass☆172Updated 4 years ago
- ☆183Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Beacon Object File Loader☆286Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- ☆135Updated last year
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆232Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- AV/EDR evasion via direct system calls.☆108Updated last year
- Finding secrets in kernel and user memory☆115Updated last year
- ☆62Updated 2 years ago
- Your syscall factory☆121Updated last month
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- It's pointy and it hurts!☆125Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- Simple BOF to read the protection level of a process☆115Updated last year
- Infect Shared Files In Memory for Lateral Movement☆194Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- A basic emulation of an "RPC Backdoor"☆240Updated 2 years ago
- ☆96Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆142Updated 11 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- Implant drop-in for EDR testing☆138Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- ☆139Updated 2 years ago