jthuraisamy / av-fingerprintsLinks
Antivirus Emulator Fingerprints
☆30Updated 7 years ago
Alternatives and similar repositories for av-fingerprints
Users that are interested in av-fingerprints are comparing it to the libraries listed below
Sorting:
- ☆33Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 6 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- ☆45Updated 7 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 5 months ago
- ☆16Updated 4 years ago
- ☆37Updated 6 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Process reimaging proof of concept code☆97Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Updated 5 years ago
- ☆28Updated 6 years ago
- medium-rare☆28Updated 6 years ago
- ☆12Updated 6 years ago
- ☆24Updated 4 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- ☆42Updated 6 years ago
- ☆37Updated 4 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 6 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Updated 5 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago