Bypass AMSI by patching AmsiScanBuffer
☆279Jun 4, 2021Updated 4 years ago
Alternatives and similar repositories for AmsiScanBufferBypass
Users that are interested in AmsiScanBufferBypass are comparing it to the libraries listed below
Sorting:
- The Hunt for Malicious Strings☆1,365May 13, 2025Updated 9 months ago
- A User Impersonation tool - via Token or Shellcode injection☆421May 21, 2022Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- "Golden" certificates☆710Aug 17, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,433Jan 14, 2026Updated last month
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Patch AMSI and ETW☆249May 8, 2024Updated last year
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆129May 9, 2021Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,090May 29, 2024Updated last year
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆107Mar 8, 2023Updated 2 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 2 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,130Nov 28, 2024Updated last year
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Mar 20, 2023Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆186Jul 21, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,086Mar 22, 2024Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆1,155Jan 9, 2021Updated 5 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆684Mar 11, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- ☆1,670Apr 14, 2025Updated 10 months ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆431Feb 16, 2026Updated 2 weeks ago
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆499Feb 3, 2022Updated 4 years ago
- PowerShell Script Obfuscator☆596Nov 2, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,607Jul 10, 2023Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆932Nov 11, 2024Updated last year
- C# Based Universal API Unhooker☆411Feb 18, 2022Updated 4 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆773Dec 21, 2022Updated 3 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- C# tool for UAC bypasses☆448Aug 10, 2021Updated 4 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,151Dec 11, 2025Updated 2 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆170Jan 25, 2024Updated 2 years ago