SafeBreach-Labs / CortexVortex
☆73Updated 8 months ago
Alternatives and similar repositories for CortexVortex:
Users that are interested in CortexVortex are comparing it to the libraries listed below
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆88Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆73Updated 11 months ago
- Lateral Movement via the .NET Profiler☆75Updated last month
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆73Updated last year
- Create Anti-Copy DRM Malware☆50Updated 4 months ago
- ☆68Updated 5 months ago
- ☆61Updated 2 years ago
- Implant drop-in for EDR testing☆131Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆90Updated 11 months ago
- Do some DLL SideLoading magic☆76Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- A BOF to enumerate system process, their protection levels, and more.☆111Updated last month
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- ☆120Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ☆105Updated last month
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- ☆126Updated last year
- ☆85Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- Find DLLs with RWX section☆76Updated last year
- ☆121Updated 4 months ago
- ☆122Updated last year