rad9800 / PMDLinks
☆151Updated 3 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- ☆143Updated last month
- ☆160Updated 5 months ago
- ☆67Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆89Updated 11 months ago
- Persist like a Dodder☆62Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆152Updated last week
- Tools for analyzing EDR agents☆238Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆150Updated 6 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 11 months ago
- ☆188Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆130Updated this week
- Vibe Malware Triage - MCP server for static PE analysis.☆62Updated 2 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 7 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆190Updated last month
- A PoC for Early Cascade process injection technique.☆189Updated 6 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆91Updated 4 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆197Updated 4 months ago
- ☆24Updated 5 months ago
- A Mythic Agent written in PIC C.☆196Updated 6 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆187Updated 9 months ago
- Retired TrustedSec Capabilities☆248Updated 8 months ago
- ☆163Updated 3 months ago
- Collection of codes focused on Linux rootkits☆143Updated last month
- Azure Post Exploitation Framework☆203Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆53Updated 4 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆263Updated 8 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆250Updated 2 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year