rad9800 / PMDLinks
☆156Updated 9 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆178Updated 2 months ago
- ☆162Updated 7 months ago
- ☆164Updated 10 months ago
- ☆72Updated 11 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 10 months ago
- Persist like a Dodder☆67Updated 8 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 3 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- The different ways to dump lsass☆206Updated 5 months ago
- RunPE implementation with multiple evasive techniques (2)☆265Updated 4 months ago
- Tools for analyzing EDR agents☆276Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated last month
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆202Updated 10 months ago
- ☆152Updated 3 months ago
- A Mythic Agent written in PIC C.☆206Updated 11 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆167Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- ☆24Updated 11 months ago
- collection of blogs about malware development and analysis☆62Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated last year
- Direct access to NTFS volumes☆291Updated 4 months ago
- A PoC for Early Cascade process injection technique.☆206Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- AppLocker-Based EDR Neutralization☆277Updated last month
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆109Updated 6 months ago