ashemery / Anti-Forensics
A Repository to Track Anti-Forensic Techniques
☆102Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Anti-Forensics
- ☆105Updated 9 months ago
- ☆82Updated 2 years ago
- Repository of Yara Rules☆88Updated last month
- ☆76Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆36Updated 7 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- Local & remote Windows DLL Proxying☆161Updated 5 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆46Updated 11 months ago
- ☆98Updated 3 weeks ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 3 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆146Updated 8 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- ☆105Updated last year
- ☆130Updated last year
- C2 Automation using Linode☆78Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆84Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- ☆181Updated 9 months ago
- ☆103Updated 4 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆61Updated 3 weeks ago
- Analyse MSI files for vulnerabilities☆109Updated 2 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago