SafeBreach-Labs / CortexVortex
☆77Updated last year
Alternatives and similar repositories for CortexVortex:
Users that are interested in CortexVortex are comparing it to the libraries listed below
- I have documented all of the AMSI patches that I learned till now☆71Updated 3 weeks ago
- ☆106Updated 2 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- ☆82Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆89Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆81Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆151Updated last year
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- ☆87Updated 11 months ago
- Lateral Movement☆122Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Find DLLs with RWX section☆79Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- ☆62Updated 2 years ago
- ☆135Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- ☆41Updated 9 months ago
- ☆54Updated 6 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 9 months ago
- Adversary Emulation Framework☆98Updated 9 months ago
- A BOF to enumerate system process, their protection levels, and more.☆115Updated 4 months ago
- To audit the security of read-only domain controllers☆115Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago