S12cybersecurity / ETWEvasionToolkitLinks
Toolkit of Projects to attack and evade Event Trace for Windows
☆15Updated this week
Alternatives and similar repositories for ETWEvasionToolkit
Users that are interested in ETWEvasionToolkit are comparing it to the libraries listed below
Sorting:
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- ☆28Updated 7 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆26Updated 2 months ago
- A simple BOF (Beacon Object File) to search files in the system☆14Updated last year
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆22Updated 4 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Updated 4 months ago
- A simple rpc2socks alternative in pure Go.☆29Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- command control framework☆22Updated 2 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆12Updated 10 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆43Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆25Updated 4 months ago
- ☆55Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 4 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- BypassCredGuard CS BOF☆45Updated 7 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆29Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 11 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆40Updated last month
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year
- ☆24Updated last year
- Golang Implementation of Hell's gate☆19Updated 2 years ago
- ☆19Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 4 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 7 months ago