Misery Loader to bypass modern EDR solutions
☆18Dec 20, 2024Updated last year
Alternatives and similar repositories for Misery
Users that are interested in Misery are comparing it to the libraries listed below
Sorting:
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- ☆26Nov 8, 2024Updated last year
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆92Feb 22, 2026Updated last week
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- This project is an almost one-to-one copy of the original cheatloader by gamesense in C#.☆10Dec 28, 2022Updated 3 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- ☆21Jan 8, 2026Updated last month
- ☆31Aug 23, 2020Updated 5 years ago
- ☆30Aug 24, 2025Updated 6 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Apr 21, 2025Updated 10 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆101Jan 26, 2026Updated last month
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 9 months ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- ☆53Mar 26, 2025Updated 11 months ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- ☆25Dec 3, 2024Updated last year
- ANY.RUN sandbox detection collection☆23Aug 21, 2024Updated last year
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Apr 21, 2025Updated 10 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 5 months ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆32May 4, 2025Updated 9 months ago