Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
☆132May 12, 2023Updated 2 years ago
Alternatives and similar repositories for Freeze
Users that are interested in Freeze are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Feb 27, 2024Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆367Jul 20, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆103Dec 15, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆611Jul 22, 2022Updated 3 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆196Sep 17, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆378Mar 31, 2026Updated 2 weeks ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆204Mar 26, 2025Updated last year
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,255Dec 11, 2023Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,260May 8, 2024Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆558Nov 23, 2025Updated 4 months ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 11 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆509Mar 7, 2026Updated last month
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆506Dec 19, 2023Updated 2 years ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Shellcode loader generator with multiples features☆507Dec 31, 2024Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,790Nov 3, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,221Jan 5, 2026Updated 3 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆267May 15, 2025Updated 10 months ago
- ☆106Sep 5, 2023Updated 2 years ago
- ☆195Mar 15, 2026Updated last month
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- shellcode loader for your evasion needs☆351Apr 30, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- ☆86Aug 8, 2024Updated last year
- ☆224Oct 22, 2023Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆629Jun 25, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 3 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,376Mar 9, 2026Updated last month