Evade EDR's the simple way, by not touching any of the API's they hook.
☆170Mar 16, 2026Updated 3 weeks ago
Alternatives and similar repositories for BYOSI
Users that are interested in BYOSI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆545May 9, 2025Updated 11 months ago
- Kill AV/EDR leveraging BYOVD attack☆397Jul 11, 2023Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Aug 9, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆587Jan 20, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆284Apr 6, 2025Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆462Aug 2, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆147Nov 6, 2025Updated 5 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- ☆234Oct 8, 2024Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆343Feb 2, 2026Updated 2 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆375Apr 19, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆281Apr 17, 2023Updated 2 years ago
- ☆410Dec 8, 2024Updated last year
- BOF with Synthetic Stackframe☆239Oct 30, 2025Updated 5 months ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆139Dec 20, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- HookChain: A new perspective for Bypassing EDR Solutions☆595Jan 5, 2025Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 2 months ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- A COFF loader made in Rust☆330Mar 14, 2026Updated 3 weeks ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- .net config loader☆349Nov 9, 2023Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆545Feb 13, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆790Jan 26, 2026Updated 2 months ago
- ☆154Oct 2, 2023Updated 2 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- Performing Indirect Clean Syscalls☆607Apr 19, 2023Updated 2 years ago