Permanently disable EDRs as local admin
☆129Dec 19, 2025Updated 3 months ago
Alternatives and similar repositories for MoveEdr
Users that are interested in MoveEdr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Updated this week
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- ☆52Mar 30, 2026Updated last week
- ☆38Apr 15, 2025Updated 11 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆341Mar 21, 2026Updated 3 weeks ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 4 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆330Oct 20, 2025Updated 5 months ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆52Jun 16, 2025Updated 9 months ago
- Collect Windows telemetry for Maldev☆467Jan 30, 2026Updated 2 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆54Oct 13, 2025Updated 5 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 5 months ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆124Jul 11, 2025Updated 9 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆249Oct 30, 2025Updated 5 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Mythic Agent written in PIC C.☆203Feb 4, 2025Updated last year
- ☆57Feb 16, 2025Updated last year
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago
- Utilizng an MCP Server to communicate with your C2☆89May 15, 2025Updated 10 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- ☆34Mar 19, 2025Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆545Feb 13, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆426Sep 29, 2025Updated 6 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆138Nov 17, 2025Updated 4 months ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆408Sep 26, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year