j3h4ck / WatchDogKillerLinks
PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.
☆46Updated this week
Alternatives and similar repositories for WatchDogKiller
Users that are interested in WatchDogKiller are comparing it to the libraries listed below
Sorting:
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Sliver agent rewritten in C++☆48Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 6 months ago
- Help red teams find opsec processes during engagements☆42Updated 9 months ago
- Indirect NT syscalls LSASS dumper.☆46Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- ☆67Updated last year
- CVE-2024-40711-exp☆42Updated 10 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆42Updated 3 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆106Updated last year
- ☆39Updated last year
- ☆57Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆39Updated 2 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- AV/EDR killer using BYOVD technique☆34Updated 11 months ago
- BypassCredGuard CS BOF☆46Updated 7 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- Test bench lab for Shellcode Obfuscation☆29Updated last week
- Use CMSTP.exe to bypass UAC.☆50Updated 3 years ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆100Updated 2 months ago
- Beacon Debugger☆54Updated 10 months ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆173Updated last month
- Beacon Object File (BOF) Template☆55Updated 9 months ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- ☆41Updated 2 years ago
- An Exercice for Red Team to Reverse & Exploit, that's a valide BYOVD Killer, not HVCI Blocklisted, and not in LOLBIN☆30Updated last month
- ☆73Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆47Updated 2 years ago
- A Simple PoC☆21Updated last year