cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆22Updated last year
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- ☆108Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 6 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- This repo contains PoCs for vulnerable Windows drivers.☆88Updated last month
- Demoting PPL anti-malware services to less than a guest user☆65Updated 11 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated 3 weeks ago
- A collection of PoCs to do common things in unconventional ways☆122Updated 4 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- Driver Reverse & Exploitation☆82Updated 4 months ago
- ☆107Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- Collection of red team techniques.☆65Updated 8 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- ☆60Updated 8 months ago
- Activation Context Hijack☆169Updated 5 months ago
- ☆44Updated last year
- Create Anti-Copy DRM Malware☆71Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆149Updated last week