A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses
☆115May 27, 2017Updated 8 years ago
Alternatives and similar repositories for DeviceGuardBypassMitigationRules
Users that are interested in DeviceGuardBypassMitigationRules are comparing it to the libraries listed below
Sorting:
- ☆30May 23, 2017Updated 8 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆101Jan 7, 2018Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Monitor activity of any driver☆353Nov 2, 2020Updated 5 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆276Aug 10, 2015Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆893Aug 20, 2021Updated 4 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆842Jun 25, 2024Updated last year