mattifestation / AntimalwareBlightView external linksLinks
Execute PowerShell code at the antimalware-light protection level.
☆142Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for AntimalwareBlight
Users that are interested in AntimalwareBlight are comparing it to the libraries listed below
Sorting:
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆373May 24, 2022Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Aug 1, 2022Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆347Sep 1, 2021Updated 4 years ago
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- ☆433Aug 17, 2022Updated 3 years ago
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- Detect strange memory regions and DLLs☆185Jan 20, 2022Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆187Jul 21, 2022Updated 3 years ago
- ☆385Jan 19, 2023Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- ☆94May 14, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆103Jun 8, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Aug 18, 2023Updated 2 years ago
- A simple COM server which provides a component to run shellcode☆149May 12, 2020Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆555Dec 3, 2023Updated 2 years ago
- ☆209Feb 24, 2022Updated 3 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆158Jun 12, 2022Updated 3 years ago
- ☆70Feb 6, 2025Updated last year
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Jul 14, 2021Updated 4 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆901Jul 20, 2024Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- You shall pass☆271Jul 16, 2022Updated 3 years ago