magicsword-io / LOLDriversLinks
Living Off The Land Drivers
☆1,348Updated last week
Alternatives and similar repositories for LOLDrivers
Users that are interested in LOLDrivers are comparing it to the libraries listed below
Sorting:
- ☆1,765Updated last year
- EDR Lab for Experimentation Purposes☆1,390Updated last month
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,220Updated 2 years ago
- The multi-platform memory acquisition tool.☆903Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,789Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆854Updated 2 weeks ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆790Updated last year
- ☆2,170Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆945Updated last month
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,546Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,036Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆970Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,270Updated 9 months ago
- ☆513Updated 2 years ago
- A tool to kill antimalware protected processes☆1,489Updated 4 years ago
- Collection of various malicious functionality to aid in malware development☆1,816Updated last year
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆689Updated 2 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,074Updated last year
- ☆776Updated 2 years ago
- Hardcore Debugging☆927Updated last week
- Original C Implementation of the Hell's Gate VX Technique☆1,138Updated 4 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,362Updated 2 months ago
- AV/EDR evasion via direct system calls.☆1,766Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆787Updated 3 months ago
- ☆606Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆662Updated last week
- Aims to identify sleeping beacons☆645Updated last year
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,170Updated 2 weeks ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,174Updated 2 years ago