nmantani / archiver-MOTW-support-comparisonLinks
☆252Updated 3 months ago
Alternatives and similar repositories for archiver-MOTW-support-comparison
Users that are interested in archiver-MOTW-support-comparison are comparing it to the libraries listed below
Sorting:
- ☆302Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆251Updated last year
- ☆164Updated 6 months ago
- ☆121Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆164Updated last year
- ☆161Updated 11 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆269Updated last year
- ☆192Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆231Updated 3 years ago
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- Python utility that generates "imageless" QR codes in various formats☆133Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆335Updated 2 months ago
- ☆223Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- ☆229Updated 6 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆169Updated 11 months ago
- Direct access to NTFS volumes☆293Updated 4 months ago
- ☆181Updated 8 months ago
- ☆290Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Collection of random RedTeam scripts.☆211Updated last year
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆252Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆205Updated last year
- A Mythic Agent written in PIC C.☆207Updated 11 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆34Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Updated 6 months ago
- Malware As A Service☆135Updated last year
- Find potential DLL Sideloads on your windows computer☆217Updated 11 months ago