logangoins / Krueger
Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC
☆334Updated last month
Alternatives and similar repositories for Krueger:
Users that are interested in Krueger are comparing it to the libraries listed below
- ☆343Updated 2 months ago
- AV/EDR Lab environment setup references to help in Malware development☆364Updated 2 months ago
- A BloodHound collector for Microsoft Configuration Manager☆301Updated last month
- Kill AV/EDR leveraging BYOVD attack☆338Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆274Updated 9 months ago
- ☆293Updated 2 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆269Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆460Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆563Updated 7 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆270Updated 3 months ago
- Amsi Bypass payload that works on Windwos 11☆375Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆546Updated 7 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆160Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆526Updated last month
- ☆164Updated 3 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆508Updated 8 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆240Updated 3 months ago
- Evasive shellcode loader☆340Updated 4 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆363Updated last month
- Materials for the workshop "Red Team Ops: Havoc 101"☆365Updated 4 months ago
- Abusing Intune for Lateral Movement over C2☆324Updated last week
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago
- Open Source C&C Specification☆232Updated this week
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆291Updated 4 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆186Updated 4 months ago
- ☆208Updated this week
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆286Updated last year
- Find potential DLL Sideloads on your windows computer☆175Updated last month
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆238Updated this week
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆381Updated 6 months ago