rad9800 / PMDLinks
☆147Updated last month
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- ☆68Updated 4 months ago
- Retired TrustedSec Capabilities☆246Updated 6 months ago
- ☆58Updated 3 months ago
- kernel callback removal (Bypassing EDR Detections)☆166Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆103Updated 2 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆144Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆79Updated 9 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆190Updated 3 weeks ago
- Windows rootkit designed to work with BYOVD exploits☆198Updated 4 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- Persist like a Dodder☆61Updated 2 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆192Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 6 months ago
- Azure Post Exploitation Framework☆199Updated 3 months ago
- ☆191Updated 8 months ago
- Find potential DLL Sideloads on your windows computer☆206Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆190Updated 3 months ago
- ☆158Updated last month
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆151Updated last week
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆208Updated last month
- A PoC for Early Cascade process injection technique.☆178Updated 4 months ago
- ☆303Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆203Updated 5 months ago
- Tools for analyzing EDR agents☆228Updated 11 months ago
- Ghosting-AMSI☆180Updated last month
- ☆188Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆99Updated 3 weeks ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆224Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆89Updated 2 months ago