almounah / orstedLinks
Orsted C2 Framework
☆87Updated this week
Alternatives and similar repositories for orsted
Users that are interested in orsted are comparing it to the libraries listed below
Sorting:
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- ☆109Updated 9 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆51Updated 2 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- ☆52Updated 2 months ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- ☆92Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Updated 9 months ago
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 4 months ago
- ☆54Updated 6 months ago
- ☆48Updated 6 months ago
- ☆26Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 8 months ago
- sideloading PoC using onedrive.exe & version.dll☆80Updated last month
- BOF to decrypt Signal Desktop chat logs☆72Updated 9 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Updated 5 months ago
- Caddy v2 module to filter requests based on C2 profiles☆39Updated 7 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆62Updated 11 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆51Updated 4 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Dump processes over WMI with MSFT_MTProcess☆79Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- ☆82Updated last year
- ☆56Updated 5 months ago
- ☆50Updated 5 months ago
- ☆98Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 6 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Updated 4 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year