Evade sysmon and windows event logging
☆625Apr 8, 2020Updated 5 years ago
Alternatives and similar repositories for Ghost-In-The-Logs
Users that are interested in Ghost-In-The-Logs are comparing it to the libraries listed below
Sorting:
- Apply a filter to the events being reported by windows event logging☆262Apr 24, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Windows AV Evasion☆832Apr 13, 2020Updated 5 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,577Jan 5, 2021Updated 5 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,606Jul 10, 2023Updated 2 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Tool to create hidden registry keys.☆491Oct 23, 2019Updated 6 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆607Feb 16, 2023Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,426Jul 20, 2024Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Mar 20, 2023Updated 2 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆819Mar 11, 2021Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,990Jan 1, 2023Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- C# Script used for Red Team☆723Nov 16, 2021Updated 4 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆807Jul 6, 2020Updated 5 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- AV/EDR evasion via direct system calls.☆1,793Sep 3, 2022Updated 3 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆501Oct 8, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- Also known by Microsoft as Knifecoat☆1,153Dec 22, 2022Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- A collection of tools to abuse chrome browser☆300Jan 15, 2021Updated 5 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Lockless allows for the copying of locked files.☆253Apr 30, 2021Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,183Jul 5, 2023Updated 2 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago