rad9800 / PMDLinks
☆149Updated 2 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- ☆67Updated 4 months ago
- ☆135Updated 2 weeks ago
- ☆133Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆90Updated 2 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆147Updated 4 months ago
- Tools for analyzing EDR agents☆230Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- kernel callback removal (Bypassing EDR Detections)☆177Updated 3 months ago
- Retired TrustedSec Capabilities☆247Updated 7 months ago
- Azure Post Exploitation Framework☆200Updated 4 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆196Updated 3 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 6 months ago
- ☆161Updated 2 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Persist like a Dodder☆61Updated last month
- Python3 utility for creating zip files that smuggle additional data for later extraction☆234Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- The most complete code auditing platform with thousands of real-world challenges☆120Updated last week
- Find potential DLL Sideloads on your windows computer☆208Updated 5 months ago
- A Mythic Agent written in PIC C.☆190Updated 4 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆175Updated 8 months ago
- Collection of codes focused on Linux rootkits☆131Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆193Updated 3 months ago
- ☆136Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago