rad9800 / PMDLinks
☆153Updated 5 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- ☆158Updated 3 months ago
- ☆70Updated 8 months ago
- ☆160Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆154Updated 8 months ago
- The different ways to dump lsass☆190Updated last month
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 7 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- Direct access to NTFS volumes☆278Updated last month
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated 2 months ago
- Persist like a Dodder☆64Updated 4 months ago
- Tools for analyzing EDR agents☆264Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆201Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 9 months ago
- Obex – Blocking unwanted DLLs in user mode☆227Updated 3 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆94Updated last month
- A Mythic Agent written in PIC C.☆200Updated 8 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆114Updated 3 weeks ago
- ☆134Updated last week
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆125Updated last month
- ☆189Updated last year
- ☆108Updated 11 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆265Updated 10 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated last week
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆61Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- Group Policy Objects manipulation and exploitation framework☆253Updated last week
- Python3 utility for creating zip files that smuggle additional data for later extraction☆260Updated 4 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆135Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆203Updated last week