SafeBreach-Labs / wd-pretenderLinks
☆131Updated last year
Alternatives and similar repositories for wd-pretender
Users that are interested in wd-pretender are comparing it to the libraries listed below
Sorting:
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- ☆119Updated last year
- 「💀」Proof of concept on BYOVD attack☆161Updated 7 months ago
- ☆189Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 11 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆148Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆142Updated 11 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated last month
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆203Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- ☆140Updated last month
- ☆105Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆313Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- ☆300Updated 8 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 4 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated 11 months ago
- Adversary Emulation Framework☆120Updated 2 weeks ago
- ☆184Updated 11 months ago
- ☆282Updated last year
- ☆70Updated 4 months ago
- Command and Control (C2) framework☆127Updated 2 months ago
- ☆148Updated 3 weeks ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆57Updated 3 weeks ago
- Just some random Red Team Scripts that can be useful☆152Updated last year
- ☆181Updated last month
- ☆118Updated 3 months ago