oldkingcone / BYOSI
Evade EDR's the simple way, by not touching any of the API's they hook.
☆84Updated 3 weeks ago
Alternatives and similar repositories for BYOSI:
Users that are interested in BYOSI are comparing it to the libraries listed below
- ☆139Updated 6 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆133Updated 6 months ago
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 8 months ago
- Just another C2 Redirector using CloudFlare.☆86Updated 9 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆185Updated 4 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 6 months ago
- ☆192Updated 10 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆88Updated 8 months ago
- Adversary Emulation Framework☆66Updated 6 months ago
- Havoc C2 profile generator☆70Updated 3 months ago
- ☆107Updated 3 months ago
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆109Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆155Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆157Updated 2 months ago
- ☆164Updated 3 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆173Updated 11 months ago
- ☆120Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆149Updated last month
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆129Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- AzureAD beacon object files☆109Updated 2 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆180Updated last year
- A PoC for Early Cascade process injection technique.☆157Updated 3 weeks ago