dobin / avred-serverLinks
The AMSI server for Avred
☆29Updated last year
Alternatives and similar repositories for avred-server
Users that are interested in avred-server are comparing it to the libraries listed below
Sorting:
- The Web UI for Antnium☆27Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Linux Sleep Obfuscation☆97Updated last year
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Python module for running BOFs☆70Updated last year
- Unpacker for donut shellcode☆17Updated 4 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- ☆29Updated last year
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- ADSI based SA tool☆17Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- ☆37Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆40Updated 2 years ago
- ☆26Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Shellcode Loader using indirect syscalls☆15Updated last year
- ☆48Updated last year
- Small POC for process ghosting☆39Updated 3 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆59Updated 2 years ago
- ☆34Updated 2 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago