magicsword-io / LOLDriversLinks
Living Off The Land Drivers
☆1,271Updated this week
Alternatives and similar repositories for LOLDrivers
Users that are interested in LOLDrivers are comparing it to the libraries listed below
Sorting:
- ☆1,700Updated last year
- EDR Lab for Experimentation Purposes☆1,337Updated last month
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆792Updated 2 weeks ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,164Updated last year
- The multi-platform memory acquisition tool.☆827Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,717Updated 9 months ago
- ☆2,133Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆770Updated last year
- ☆503Updated last year
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,071Updated last week
- PoCs and tools for investigation of Windows process execution techniques☆935Updated last month
- A tool to kill antimalware protected processes☆1,465Updated 4 years ago
- Win32 and Kernel abusing techniques for pentesters☆961Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,054Updated last year
- Hardcore Debugging☆902Updated 4 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated last year
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆671Updated last month
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,001Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,259Updated 5 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,484Updated last year
- ☆585Updated 2 months ago
- ☆522Updated 2 months ago
- ☆765Updated last year
- Collection of various malicious functionality to aid in malware development☆1,729Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,089Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,728Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,273Updated 2 months ago
- Dynamic unpacker based on PE-sieve☆751Updated 3 months ago
- Elastic Security detection content for Endpoint☆1,271Updated this week
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆382Updated 7 months ago