outflanknl / edr-internalsLinks
Tools for analyzing EDR agents
☆232Updated last year
Alternatives and similar repositories for edr-internals
Users that are interested in edr-internals are comparing it to the libraries listed below
Sorting:
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆265Updated 9 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 6 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 7 months ago
- kernel callback removal (Bypassing EDR Detections)☆177Updated 3 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆350Updated 5 months ago
- EDRSandblast-GodFault☆266Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆129Updated 3 weeks ago
- Sleep obfuscation☆229Updated 7 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆197Updated 3 months ago
- A set of programs for analyzing common vulnerabilities in COM☆220Updated 10 months ago
- ☆155Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated last year
- ☆105Updated last year
- ☆189Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆317Updated 9 months ago
- Exploitation of process killer drivers☆201Updated last year
- ☆260Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 11 months ago
- ☆119Updated last year
- A Mythic Agent written in PIC C.☆192Updated 5 months ago
- Open Source C&C Specification☆262Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆245Updated 3 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆191Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆228Updated 6 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆256Updated last month
- Collect Windows telemetry for Maldev☆373Updated this week