☆335Aug 20, 2025Updated 6 months ago
Alternatives and similar repositories for defcon33_silence_kill_edr
Users that are interested in defcon33_silence_kill_edr are comparing it to the libraries listed below
Sorting:
- ☆55May 31, 2025Updated 9 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆209Sep 11, 2025Updated 6 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆271Jun 18, 2025Updated 9 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆471Updated this week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 11 months ago
- General Purpose OpSec Server☆112Updated this week
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 9 months ago
- A hoontr must hoont☆106Nov 27, 2025Updated 3 months ago
- Linker for Beacon Object Files☆160Feb 22, 2026Updated 3 weeks ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆356Apr 26, 2025Updated 10 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 7 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆563Nov 1, 2025Updated 4 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆809Nov 1, 2025Updated 4 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- ☆335Sep 21, 2025Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- A BOF that runs unmanaged PEs inline☆683Oct 23, 2024Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆219Aug 31, 2025Updated 6 months ago
- ☆86May 15, 2025Updated 10 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month