pathtofile / SimpleAmsiProviderLinks
A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface
☆17Updated 6 years ago
Alternatives and similar repositories for SimpleAmsiProvider
Users that are interested in SimpleAmsiProvider are comparing it to the libraries listed below
Sorting:
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- ☆37Updated 4 years ago
- ☆24Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- ☆24Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- ☆18Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- ☆31Updated 5 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- ☆16Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Windows process injection methods☆19Updated 6 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- Tool to manage user privileges☆31Updated 6 years ago
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- ☆48Updated 4 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Updated 5 years ago
- ☆34Updated 8 years ago
- Clone running process with ZwCreateProcess☆59Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 5 years ago