Rostelecom-Red-Team / GoodbyeEDRLinks
☆81Updated 3 years ago
Alternatives and similar repositories for GoodbyeEDR
Users that are interested in GoodbyeEDR are comparing it to the libraries listed below
Sorting:
- bypass UAC even when configured to always notify user☆30Updated 3 years ago
- UAC_wenpon☆49Updated 3 years ago
- ☆74Updated 4 years ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- A simple hidden vnc.☆33Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- DLL Unhooking☆12Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- ShellCodeLoader via DInvoke☆58Updated 4 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- Kernel file/process/object tool☆67Updated 4 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆56Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- A flexible tool that creates a minidump of the LSASS process☆13Updated 3 years ago
- A SigFlip implement in golang☆47Updated 3 years ago
- Windows Defender VDM lua collections☆47Updated 2 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- ☆50Updated 3 years ago
- ☆74Updated 4 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆47Updated 3 years ago
- ☆32Updated 5 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆35Updated 2 years ago