casp3r0x0 / CortexRansomBypass
Cortex EDR Ransomware protection Bypass
☆21Updated 2 months ago
Alternatives and similar repositories for CortexRansomBypass:
Users that are interested in CortexRansomBypass are comparing it to the libraries listed below
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆56Updated this week
- Proxy function calls through the thread pool with ease☆25Updated last month
- A pure C version of SymProcAddress☆26Updated last year
- Sniffing files generator☆54Updated last month
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated this week
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ☆54Updated 5 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆17Updated 2 weeks ago
- A python script that automates a C2 Profile build☆35Updated 3 weeks ago
- Shellcode Loader Utilizing ETW Events☆62Updated last month
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆14Updated this week
- Determine if the WebClient Service (WebDAV) is running on a remote system☆18Updated last year
- BOF for C2 framework☆40Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Rust template/library for implementing your own COFF loader☆49Updated 2 months ago
- in-process powershell runner for BRC4☆45Updated last year
- shell code example☆34Updated last month
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- ☆48Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- Post-Ex BOF tooling for Hannibal☆20Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 11 months ago
- Impersonate Tokens using only NTAPI functions☆54Updated last week
- ☆27Updated 3 months ago
- ☆37Updated last month