rad9800 / byorLinks
☆155Updated 2 months ago
Alternatives and similar repositories for byor
Users that are interested in byor are comparing it to the libraries listed below
Sorting:
- A PoC for Early Cascade process injection technique.☆191Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆154Updated last month
- A Mythic Agent written in PIC C.☆199Updated 6 months ago
- Stage 0☆164Updated 8 months ago
- Adversary Emulation Framework☆122Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆196Updated last month
- ☆195Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆205Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 8 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- Utilities for obfuscating shellcode☆86Updated 5 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆153Updated 7 months ago
- early cascade injection PoC based on Outflanks blog post☆229Updated 9 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 5 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- ☆160Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆118Updated 8 months ago
- ☆145Updated 3 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆98Updated this week
- A hoontr must hoont☆62Updated 2 weeks ago
- Code execution/injection technique using DLL PEB module structure manipulation☆163Updated 2 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆265Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated last month
- Ghosting-AMSI☆211Updated 4 months ago
- Local & remote Windows DLL Proxying☆165Updated last year