her0ness / av-edr-urls
AV/EDR companies netblocks
☆14Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for av-edr-urls
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- time-based user enum via Basic Auth in Azure☆28Updated last month
- ☆20Updated last month
- in-process powershell runner for BRC4☆37Updated last year
- ☆15Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Bunch of BOF files☆23Updated 8 months ago
- ☆43Updated 4 months ago
- A care package of useful bofs for red team engagments☆48Updated 2 years ago
- Python module for running BOFs☆64Updated last year
- ☆59Updated 3 months ago
- ☆26Updated 3 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated 10 months ago
- ☆46Updated last year
- Click Once + App Domain☆62Updated 11 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 3 months ago
- winacl, a cross platforms Go library to work with ntSecurityDescriptor.☆23Updated last week
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆36Updated last month
- Bypassing Amsi using LdrLoadDll☆20Updated 2 weeks ago
- My BloodHound custom queries☆22Updated last year
- ☆13Updated last month
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- ☆27Updated 5 months ago
- ☆47Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Nemesis agent for Mythic☆24Updated 2 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆33Updated last month