rad9800 / PMDLinks
☆152Updated 4 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- ☆155Updated 2 months ago
- ☆160Updated 5 months ago
- ☆68Updated 7 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆86Updated last week
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆68Updated 3 months ago
- Tools for analyzing EDR agents☆241Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆154Updated last month
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆59Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆153Updated 7 months ago
- Persist like a Dodder☆64Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- A PoC for Early Cascade process injection technique.☆191Updated 7 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆265Updated 9 months ago
- ☆188Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆198Updated 5 months ago
- ☆255Updated last week
- A Mythic Agent written in PIC C.☆199Updated 6 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆257Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 8 months ago
- ☆206Updated 2 months ago
- Retired TrustedSec Capabilities☆248Updated 9 months ago
- Azure Post Exploitation Framework☆204Updated 6 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆265Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆196Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆190Updated 10 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆92Updated 4 months ago