The AMSI server for Avred
☆33Sep 15, 2023Updated 2 years ago
Alternatives and similar repositories for avred-server
Users that are interested in avred-server are comparing it to the libraries listed below
Sorting:
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago
- ☆33Apr 7, 2020Updated 5 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- ☆246Dec 16, 2022Updated 3 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated 3 weeks ago
- ☆27Aug 8, 2021Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆17Jan 12, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- ☆16Dec 7, 2025Updated 2 months ago
- ☆31Jul 26, 2024Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆166Dec 7, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Jan 30, 2026Updated last month
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- ☆21Jan 8, 2026Updated last month
- ☆14Sep 22, 2023Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆17Jul 16, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- A Payload Analysis Framework☆117Oct 9, 2025Updated 4 months ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago