iamagarre / BadExclusions
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
☆18Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for BadExclusions
- A simple rpc2socks alternative in pure Go.☆24Updated 4 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆17Updated last year
- Cobalt Strike notifications via NTFY.☆13Updated 2 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- The Totally Legit Authentication Dialog☆12Updated last year
- All my POC related to malware development☆11Updated 6 months ago
- Mythic C2 wrapper for NimSyscallPacker☆19Updated this week
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated 8 months ago
- string encryption in Nim☆17Updated 5 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆13Updated 3 weeks ago
- ☆15Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Bunch of BOF files☆24Updated 9 months ago
- A small example of loading BOFs in Python with pure reflection☆17Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆15Updated 6 months ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 5 months ago
- in-process powershell runner for BRC4☆37Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆30Updated 6 months ago