The AMSI server for Avred
☆33Sep 15, 2023Updated 2 years ago
Alternatives and similar repositories for avred-server
Users that are interested in avred-server are comparing it to the libraries listed below
Sorting:
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- ☆33Apr 7, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- ☆246Dec 16, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Mar 12, 2026Updated last week
- ☆33Mar 19, 2025Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- ☆13Dec 27, 2014Updated 11 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆173Updated this week
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- Git+Ansible: watch git repo for changes and run only changed playbooks☆17Jan 23, 2023Updated 3 years ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆337Aug 7, 2024Updated last year
- ☆14Sep 22, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Because AV evasion should be easy.☆862Nov 28, 2024Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Feb 23, 2026Updated 3 weeks ago