rad9800 / FileRenameJunctionsEDRDisable
☆59Updated this week
Alternatives and similar repositories for FileRenameJunctionsEDRDisable:
Users that are interested in FileRenameJunctionsEDRDisable are comparing it to the libraries listed below
- Construct the payload at runtime using an array of offsets☆59Updated 5 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆56Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆44Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 5 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆101Updated this week
- ☆105Updated 3 weeks ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 8 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆56Updated 4 months ago
- "Service-less" driver loading☆143Updated 2 weeks ago
- Section-based payload obfuscation technique for x64☆59Updated 4 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆87Updated this week
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆105Updated 7 months ago
- Find DLLs with RWX section☆75Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Sniffing files generator☆44Updated last month
- ☆58Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆79Updated 8 months ago
- ☆60Updated 6 months ago
- ☆128Updated 4 months ago
- Do some DLL SideLoading magic☆76Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆92Updated last year
- ☆68Updated 4 months ago
- ☆39Updated last month
- ☆109Updated 3 years ago
- A cmkr based win32 shellcode template for a unified build platform and more production friendly structure/testing.☆59Updated 3 weeks ago
- Source code and examples for PassiveAggression☆54Updated 6 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆127Updated 4 months ago