pwnfuzz / byovd-watchdogLinks
Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.
☆32Updated last week
Alternatives and similar repositories for byovd-watchdog
Users that are interested in byovd-watchdog are comparing it to the libraries listed below
Sorting:
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- Select any exported function in a dll as the new dll's entry point.☆82Updated last year
- I have documented all of the AMSI patches that I learned till now☆76Updated 2 months ago
- Beacon Debugger☆55Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- ☆89Updated 2 years ago
- ☆57Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- ☆68Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- ☆82Updated last year
- ☆100Updated 2 years ago
- Plantronics Desktop Hub LPE☆37Updated last year
- UDC2 implementation that provides an ICMP C2 channel☆113Updated last month
- Self-mutating macOS implant☆105Updated last month
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆133Updated 3 years ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆108Updated 2 weeks ago
- ☆37Updated 2 weeks ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Repo that holds random POCs☆52Updated 2 years ago
- ☆80Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆105Updated 5 months ago
- ☆33Updated 10 months ago
- sideloading PoC using onedrive.exe & version.dll☆88Updated 2 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆77Updated 5 months ago