Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.
☆14Jul 9, 2023Updated 2 years ago
Alternatives and similar repositories for birdnet-poc
Users that are interested in birdnet-poc are comparing it to the libraries listed below
Sorting:
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- ☆19Dec 18, 2024Updated last year
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- A small C/C++ library to lookup Windows error codes.☆21Jul 1, 2024Updated last year
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆17Jul 6, 2021Updated 4 years ago
- A 64 bit executable junk code engine for polymorphic malware.☆76Jun 16, 2025Updated 8 months ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆21Dec 12, 2021Updated 4 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 4 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 8 months ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- Remote Shellcode Injector☆219Aug 27, 2023Updated 2 years ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 3 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆240Jun 22, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Automate SSH in python easily!☆32Aug 23, 2025Updated 6 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Mar 19, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆95Apr 22, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- A Powershell module that helps you identify AppLocker weaknesses☆173Feb 11, 2020Updated 6 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month