V-i-x-x / AMSI-WRITE-RAID-BYPASSLinks
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
☆298Updated last week
Alternatives and similar repositories for AMSI-WRITE-RAID-BYPASS
Users that are interested in AMSI-WRITE-RAID-BYPASS are comparing it to the libraries listed below
Sorting:
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆314Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆509Updated 5 months ago
- AV/EDR Lab environment setup references to help in Malware development☆406Updated 7 months ago
- Amsi Bypass payload that works on Windwos 11☆375Updated 2 years ago
- ☆368Updated 2 years ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆379Updated last week
- ☆287Updated 2 years ago
- Open Source C&C Specification☆266Updated 7 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆328Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆167Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆271Updated last year
- Stealthily inject shellcode into an executable☆307Updated 3 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆338Updated 2 years ago
- ☆182Updated 3 months ago
- Analyse your malware to surgically obfuscate it☆499Updated 4 months ago
- ☆261Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆284Updated 2 months ago
- Kill AV/EDR leveraging BYOVD attack☆374Updated 2 years ago
- shellcode loader for your evasion needs☆340Updated 5 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆247Updated 5 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆378Updated 9 months ago
- Protected Process Dumper Tool☆566Updated 2 years ago
- Ghosting-AMSI☆218Updated 5 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆408Updated 4 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆340Updated 2 weeks ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆27Updated last year