iamagarre / BadExclusionsLinks
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
☆20Updated 2 years ago
Alternatives and similar repositories for BadExclusions
Users that are interested in BadExclusions are comparing it to the libraries listed below
Sorting:
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆18Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31Updated 8 months ago
- Windows Access token manipulation tool made in C#☆24Updated 5 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Updated 2 years ago
- ☆47Updated 2 years ago
- ☆31Updated last year
- string encryption in Nim☆20Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- ☆19Updated last year
- Cobalt Strike notifications via NTFY.☆15Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Updated last year
- BOF for C2 framework☆44Updated last year
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Updated 10 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 11 months ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- ☆49Updated 3 years ago