A centralized resource for previously documented WDAC bypass techniques
☆610Sep 8, 2025Updated 5 months ago
Alternatives and similar repositories for UltimateWDACBypassList
Users that are interested in UltimateWDACBypassList are comparing it to the libraries listed below
Sorting:
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆740Jul 22, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,498Dec 21, 2023Updated 2 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,722Feb 23, 2026Updated last week
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆1,083Jul 26, 2021Updated 4 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆169Jan 25, 2024Updated 2 years ago
- Remote operations commands implemented using Beacon Object Files☆1,120Feb 23, 2026Updated last week
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,606Jul 10, 2023Updated 2 years ago
- ☆2,168Feb 21, 2023Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- "Golden" certificates☆710Aug 17, 2024Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆681Oct 23, 2024Updated last year
- Aims to identify sleeping beacons☆662Jan 25, 2026Updated last month
- Threadless Process Injection using remote function hooking.☆810Sep 4, 2024Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,295Mar 21, 2025Updated 11 months ago
- TartarusGate, Bypassing EDRs☆653Jan 25, 2022Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,631Aug 6, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆374Sep 20, 2025Updated 5 months ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- ☆1,670Apr 14, 2025Updated 10 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆931Nov 11, 2024Updated last year