bolonobolo / av_evasion
☆22Updated 3 years ago
Related projects: ⓘ
- Extended Process List (Search functionality)☆27Updated 3 years ago
- ☆15Updated this week
- ☆17Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 3 years ago
- ☆17Updated this week
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated last year
- A C port of b33f's UrbanBishop☆35Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆18Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆32Updated 3 years ago
- My experience using Windows API for offensive purposes☆17Updated 3 years ago
- ☆22Updated this week
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 6 months ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- ☆25Updated this week
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- ☆12Updated 2 years ago
- ☆10Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- ☆23Updated this week
- ☆44Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆29Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆37Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 2 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆26Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- ☆23Updated 2 years ago
- ☆10Updated this week
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago