Shrfnt77 / AmsiBypass
Bypassing Amsi using LdrLoadDll
☆24Updated last month
Related projects ⓘ
Alternatives and complementary repositories for AmsiBypass
- Example of using Sleep to create better named pipes.☆41Updated last year
- Bunch of BOF files☆24Updated 9 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- BOF for C2 framework☆40Updated last week
- Python3 rewrite of AsOutsider features of AADInternals☆35Updated 2 months ago
- Click Once + App Domain☆62Updated 11 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- Scripts to interact with Microsoft Graph APIs☆31Updated 2 weeks ago
- ☆47Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 6 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 5 months ago
- A care package of useful bofs for red team engagments☆48Updated 2 years ago
- A pure C version of SymProcAddress☆23Updated 8 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆17Updated last year
- ☆22Updated 6 months ago
- Purple Team Dropper generator using open source templates.☆14Updated 5 months ago
- ☆27Updated 3 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- SOCKS5 over WebSockets and HTTP☆13Updated last week
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆18Updated last year
- ☆58Updated 11 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆51Updated 4 years ago
- in-process powershell runner for BRC4☆37Updated last year
- ☆28Updated 5 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆38Updated last year