pwn1sher / KillDefender
A small POC to make defender useless by removing its token privileges and lowering the token integrity
☆681Updated 2 years ago
Alternatives and similar repositories for KillDefender:
Users that are interested in KillDefender are comparing it to the libraries listed below
- Cobalt Strike UDRL for memory scanner evasion.☆921Updated 10 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,309Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆709Updated 7 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆653Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,075Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,212Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,140Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆843Updated 2 years ago
- Various Cobalt Strike BOFs☆630Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,182Updated 11 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,093Updated this week
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆961Updated 2 years ago
- Dump the memory of a PPL with a userland exploit☆868Updated 2 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆455Updated 2 years ago
- PIC lsass dumper using cloned handles☆582Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆771Updated 2 years ago
- ☆518Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆997Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆460Updated 11 months ago
- ☆955Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆933Updated last year
- Cobalt Strike Shellcode Generator☆654Updated 3 months ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆365Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆788Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆769Updated last year
- A Highly capable Pe Packer☆698Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,407Updated 8 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆632Updated 2 years ago