mranv / adPentest
Windows Active DIrectory Pentesting documentation.
☆17Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for adPentest
- Lifetime AMSI bypass.☆36Updated 4 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆25Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 7 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆55Updated 3 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆77Updated last month
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 3 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆52Updated 3 months ago
- BOF for C2 framework☆40Updated last week
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Utilities for obfuscating shellcode☆45Updated 4 months ago
- ☆98Updated 3 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆105Updated 6 months ago
- A Mythic Agent written in PIC C.☆68Updated this week
- A pure C version of SymProcAddress☆23Updated 8 months ago
- ☆27Updated 3 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆63Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆73Updated last month
- Template-based generation of shellcode loaders☆67Updated 7 months ago
- ☆126Updated 3 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Enable or Disable TokenPrivilege(s)☆12Updated 6 months ago