iamagarre / BadExclusionsLinks
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
☆20Updated last year
Alternatives and similar repositories for BadExclusions
Users that are interested in BadExclusions are comparing it to the libraries listed below
Sorting:
- A simple rpc2socks alternative in pure Go.☆28Updated 11 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- Get NetNTLMv2 in Go☆12Updated 2 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- BOF for C2 framework☆41Updated 7 months ago
- ☆18Updated 6 months ago
- ☆17Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated last month
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆14Updated 3 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆34Updated 2 months ago
- Golang Implementation of Hell's gate☆17Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆24Updated last month
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- ☆48Updated 2 years ago
- Unix Process hollowing in rust☆22Updated 6 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- ☆35Updated 5 months ago
- A lexer and parser for Sleep☆20Updated last month
- The Totally Legit Authentication Dialog☆12Updated last year