j3h4ck / MiniEDRLinks
MiniEDR is a kernel-mode process monitor that logs creations & terminations via a named pipe. Built for research & learning, exploring Windows internals & EDR mechanisms!
☆18Updated 11 months ago
Alternatives and similar repositories for MiniEDR
Users that are interested in MiniEDR are comparing it to the libraries listed below
Sorting:
- RunPE implementation with multiple evasive techniques (2)☆269Updated 4 months ago
- ☆37Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- Find potential DLL Sideloads on your windows computer☆218Updated last year
- ☆334Updated 5 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- The different ways to dump lsass☆261Updated 5 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆168Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆270Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- ☆164Updated 11 months ago
- C2 Infrastructure Automation☆117Updated 7 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆446Updated this week
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆261Updated 9 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 11 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆121Updated 5 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆217Updated 3 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- ☆82Updated 9 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆167Updated 7 months ago
- Ghosting-AMSI☆220Updated 9 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- Azure Post Exploitation Framework☆244Updated 3 months ago
- ☆154Updated 4 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆149Updated 7 months ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆423Updated 3 months ago
- ☆240Updated 10 months ago
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago