deepinstinct / NoFilterLinks
☆299Updated 7 months ago
Alternatives and similar repositories for NoFilter
Users that are interested in NoFilter are comparing it to the libraries listed below
Sorting:
- ☆277Updated last year
- Kill AV/EDR leveraging BYOVD attack☆359Updated last year
- ☆378Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- Find potential DLL Sideloads on your windows computer☆206Updated 4 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆292Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆336Updated last year
- ☆191Updated 8 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆306Updated 6 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- Open Source C&C Specification☆253Updated 3 months ago
- Some scripts to abuse kerberos using Powershell☆340Updated last year
- Recovering NTLM hashes from Credential Guard☆339Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆200Updated 3 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆330Updated 10 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆324Updated 10 months ago
- .net config loader☆328Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆190Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆468Updated 2 months ago
- ☆203Updated last year
- ☆188Updated last year
- ☆221Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- ☆141Updated 9 months ago
- ☆144Updated 2 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆276Updated last year
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- Attempt at Obfuscated version of SharpCollection☆214Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆223Updated last month
- An interactive shell to spoof some LOLBins command line☆184Updated last year