mranv / adPentestLinks
Windows Active DIrectory Pentesting documentation.
☆19Updated last year
Alternatives and similar repositories for adPentest
Users that are interested in adPentest are comparing it to the libraries listed below
Sorting:
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆28Updated last year
- .NET tool used to enrich RPC telemetry☆87Updated last month
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- ☆107Updated 8 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆38Updated 7 months ago
- UAC Bypass using CMSTP in Rust☆29Updated 7 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- Windows Administrator level Implant.☆49Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆44Updated 2 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- Payload Generation Workflow☆39Updated 3 weeks ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆39Updated last week
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆17Updated 11 months ago
- EvilGinx Modify / Custom PHISHLETs / JS☆40Updated this week
- Utilizng an MCP Server to communicate with your C2☆75Updated 2 months ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆35Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- ☆34Updated 2 weeks ago
- ☆55Updated 8 months ago
- ☆37Updated last year
- EvtPsst☆55Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 7 months ago