lleon1435 / birdnet-poc
Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for birdnet-poc
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 3 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- BOF for C2 framework☆40Updated this week
- Sleep obfuscation☆47Updated this week
- ☆47Updated last year
- Rewrite to fit my needs☆25Updated 3 months ago
- ☆58Updated 10 months ago
- shell code example☆14Updated 3 weeks ago
- ☆35Updated 2 weeks ago
- Collect Windows telemetry for Maldev☆36Updated this week
- ☆27Updated 2 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆70Updated 3 weeks ago
- Bypassing Amsi using LdrLoadDll☆20Updated 2 weeks ago
- A pure C version of SymProcAddress☆23Updated 7 months ago
- ☆27Updated 5 months ago
- ☆46Updated last year
- miscellaneous codes☆35Updated last year
- Click Once + App Domain☆62Updated 11 months ago
- ☆59Updated 3 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated 8 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆30Updated this week
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- A care package of useful bofs for red team engagments☆48Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆26Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 2 months ago