Yaxser / Backstab
A tool to kill antimalware protected processes
☆1,420Updated 3 years ago
Alternatives and similar repositories for Backstab:
Users that are interested in Backstab are comparing it to the libraries listed below
- LSASS memory dumper using direct system calls and API unhooking.☆1,521Updated 4 years ago
- Open-Source Shellcode & PE Packer☆1,925Updated last year
- Alternative Shellcode Execution Via Callbacks☆1,533Updated 2 years ago
- ☆2,064Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,390Updated 7 months ago
- The swiss army knife of LSASS dumping☆1,894Updated 6 months ago
- ☆1,617Updated 6 months ago
- Situational Awareness commands implemented using Beacon Object Files☆1,355Updated this week
- The Hunt for Malicious Strings☆1,177Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,616Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,475Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,299Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,650Updated last year
- Syscall Shellcode Loader (Work in Progress)☆1,172Updated 10 months ago
- Some notes and examples for cobalt strike's functionality☆1,010Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,135Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,851Updated 2 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,133Updated last year
- ☆1,451Updated last year
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,448Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆929Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,128Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,072Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,159Updated 9 months ago
- This program is designed to demonstrate various process injection techniques☆1,124Updated last year
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆680Updated 2 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,681Updated 6 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,857Updated 3 months ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,294Updated 8 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,371Updated 2 years ago