cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆22Updated last year
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆121Updated 7 months ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- ☆108Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- Activation Context Hijack☆169Updated 4 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆65Updated this week
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated last month
- ☆41Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆133Updated 4 months ago
- Demoting PPL anti-malware services to less than a guest user☆66Updated 11 months ago
- BYOVD Technique Example using viragt64 driver☆65Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆136Updated 4 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆74Updated 6 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Create Anti-Copy DRM Malware☆69Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 11 months ago
- Collection of red team techniques.☆64Updated 8 months ago
- ☆59Updated 8 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆133Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- A collection of PoCs to do common things in unconventional ways☆121Updated 4 months ago
- Payload encoding utility to effectively lower payload entropy.☆120Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Driver Reverse & Exploitation☆82Updated 3 months ago