ScriptIdiot / SysmonQuiet
RDLL for Cobalt Strike beacon to silence sysmon process
☆87Updated 2 years ago
Alternatives and similar repositories for SysmonQuiet:
Users that are interested in SysmonQuiet are comparing it to the libraries listed below
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Do some DLL SideLoading magic☆77Updated last year
- Tool for playing with Windows Access Token manipulation.☆53Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆80Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆88Updated 2 years ago
- ☆71Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated 11 months ago
- Just another ntdll unhooking using Parun's Fart technique☆73Updated last year
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆91Updated 3 years ago
- A C# port of the MinHook API hooking library☆50Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- ☆134Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Python module for running BOFs☆64Updated last year
- ☆61Updated 2 years ago
- A care package of useful bofs for red team engagments☆54Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- I have documented all of the AMSI patches that I learned till now☆69Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆100Updated last year
- ☆122Updated last year
- ☆127Updated last year
- ☆54Updated 3 years ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆172Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year