rad9800 / PMDLinks
☆154Updated 6 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆134Updated last week
- ☆158Updated 5 months ago
- ☆71Updated 9 months ago
- ☆164Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆300Updated this week
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- The different ways to dump lsass☆195Updated 3 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆116Updated 2 weeks ago
- Tools for analyzing EDR agents☆269Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- Persist like a Dodder☆66Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 10 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆162Updated 9 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆96Updated 2 months ago
- Direct access to NTFS volumes☆283Updated 2 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆331Updated 2 weeks ago
- Vibe Malware Triage - MCP server for static PE analysis.☆72Updated 6 months ago
- ☆144Updated last month
- A Mythic Agent written in PIC C.☆202Updated 9 months ago
- ☆24Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 10 months ago
- Retired TrustedSec Capabilities☆248Updated 11 months ago
- RunPE implementation with multiple evasive techniques☆241Updated last month
- Comprehensive Windows Syscall Extraction & Analysis Framework☆151Updated 2 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆201Updated 7 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆131Updated 2 months ago
- A PoC for Early Cascade process injection technique.☆200Updated 9 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆113Updated 5 months ago
- Obex – Blocking unwanted DLLs in user mode☆262Updated 2 months ago