hackforyourentertainment / MiseryLinks
Misery Loader to bypass modern EDR solutions
☆17Updated last year
Alternatives and similar repositories for Misery
Users that are interested in Misery are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 7 months ago
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- A pure C version of SymProcAddress☆30Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆80Updated 2 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- macOS dylib stager☆36Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Updated 7 months ago
- Vectored Exception Handling Squared☆29Updated last month
- BOF for C2 framework☆44Updated last year
- Commandline spoofing on Windows☆92Updated 2 months ago
- ☆38Updated 9 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- RPC to WebClient startup☆54Updated 5 months ago
- ☆106Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Updated 6 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- A bunch of shenanigans using functions, VEH and more☆37Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Updated last year
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Updated last month
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated last month
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 7 months ago
- Bunch of BOF files☆38Updated 7 months ago