kyxiaxiang / AV_EDR_EPP_Notes
☆47Updated last year
Alternatives and similar repositories for AV_EDR_EPP_Notes:
Users that are interested in AV_EDR_EPP_Notes are comparing it to the libraries listed below
- Help red teams find opsec processes during engagements☆36Updated 4 months ago
- ☆80Updated last year
- AdaptixFramework Extension Kit☆60Updated this week
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated last year
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆71Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated 2 months ago
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆38Updated 6 months ago
- A Simple PoC☆21Updated 11 months ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆37Updated 6 months ago
- replace the shellcode chatacters so that reduce the entropy☆16Updated last year
- ☆26Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- A simple Sleepmask BOF example☆98Updated 7 months ago
- vehsyscall:a syscall project that may bypass EDR☆56Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆51Updated 2 years ago
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Evasive loader to bypass static detection☆58Updated last year
- Load shellcode via syscall☆53Updated 3 years ago
- Self Cleanup in post-ex job☆55Updated 7 months ago
- ☆69Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆44Updated 2 years ago
- ☆40Updated last year
- ☆140Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated last year
- A basic C2 framework written in C☆61Updated 9 months ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated last year
- CVE-2024-40711-exp☆41Updated 6 months ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆42Updated 2 years ago