Stop Defender Service using C# via Token Impersonation
☆169Jan 30, 2022Updated 4 years ago
Alternatives and similar repositories for DefenderStop
Users that are interested in DefenderStop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆690Jun 28, 2022Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆30Nov 7, 2022Updated 3 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 4 months ago
- ☆185Jan 5, 2021Updated 5 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- ☆113May 24, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆143Jan 9, 2022Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆267Oct 23, 2022Updated 3 years ago
- ☆669Nov 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Feb 9, 2022Updated 4 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- C# Based Universal API Unhooker☆409Feb 18, 2022Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆445Jan 25, 2023Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,637Aug 6, 2022Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆438Jan 8, 2022Updated 4 years ago
- Stop Windows Defender programmatically☆992Nov 4, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- ☆207Feb 24, 2022Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆217Jun 30, 2020Updated 5 years ago
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- PowerShell Obfuscation and Data Science☆183May 4, 2022Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆258May 25, 2023Updated 2 years ago
- Stop Windows Defender using the Win32 API☆192Feb 2, 2022Updated 4 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago