lab52io / StopDefender
Stop Windows Defender programmatically
☆955Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for StopDefender
- A tool to kill antimalware protected processes☆1,382Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆793Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,130Updated 6 months ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆888Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆899Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,297Updated 3 months ago
- Spartacus DLL/COM Hijacking Toolkit☆995Updated 9 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆815Updated this week
- Cobalt Strike UDRL for memory scanner evasion.☆879Updated 5 months ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆666Updated 2 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆734Updated 4 years ago
- kill anti-malware protected processes ( BYOVD) (Microsoft Won )☆901Updated last year
- The swiss army knife of LSASS dumping☆1,792Updated 2 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,258Updated 11 months ago
- A Highly capable Pe Packer☆684Updated 2 years ago
- HVNC for Cobalt Strike☆1,163Updated 11 months ago
- Alternative Shellcode Execution Via Callbacks☆1,450Updated 2 years ago
- Open-Source Shellcode & PE Packer☆1,858Updated 9 months ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,087Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,150Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆856Updated 2 years ago
- Use ICMLuaUtil to Bypass UAC!☆492Updated 4 years ago
- PoCs and tools for investigation of Windows process execution techniques☆882Updated this week
- UAC bypass by abusing RPC and debug objects.☆602Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆927Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆872Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,143Updated last year
- This program is designed to demonstrate various process injection techniques☆1,078Updated last year
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆422Updated 2 weeks ago