BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
☆21Feb 8, 2024Updated 2 years ago
Alternatives and similar repositories for BadExclusions
Users that are interested in BadExclusions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Nov 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated 2 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆74Feb 20, 2024Updated 2 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 5 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- find dll base addresses without PEB WALK☆163Jul 13, 2025Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆156Nov 23, 2025Updated 5 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆299Apr 10, 2021Updated 5 years ago
- ☆102Oct 7, 2023Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- ☆14Oct 25, 2019Updated 6 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆40Jun 9, 2024Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆109Jan 24, 2024Updated 2 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Click Once + App Domain☆67Feb 23, 2026Updated 2 months ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- ☆18Feb 29, 2024Updated 2 years ago
- SAM Dumping in C#☆55Nov 27, 2025Updated 5 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- ☆31Jul 26, 2024Updated last year
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago