RedTeamOperations / Journey-to-McAfee
☆112Updated 2 years ago
Alternatives and similar repositories for Journey-to-McAfee:
Users that are interested in Journey-to-McAfee are comparing it to the libraries listed below
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆148Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆142Updated 4 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- It's pointy and it hurts!☆124Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- ☆133Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- ☆88Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆147Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Simple BOF to read the protection level of a process☆115Updated last year
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆104Updated last year
- Do some DLL SideLoading magic☆79Updated last year
- Evasive Process Hollowing Techniques☆137Updated 4 years ago
- Beacon Object File Loader☆285Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- ☆62Updated 2 years ago
- ☆142Updated 2 years ago
- UI for creating LNKs☆102Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆194Updated 2 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- ☆136Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆190Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆230Updated 2 years ago