reveng007 / AMSI-patches-learned-till-now
I have documented all of the AMSI patches that I learned till now
☆71Updated last year
Alternatives and similar repositories for AMSI-patches-learned-till-now:
Users that are interested in AMSI-patches-learned-till-now are comparing it to the libraries listed below
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆74Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆99Updated last year
- ☆97Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- ☆134Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆69Updated 3 weeks ago
- ☆61Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆138Updated last year
- ☆123Updated last year
- ☆120Updated last year
- ☆127Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆76Updated 3 months ago
- Tool for playing with Windows Access Token manipulation.☆53Updated 2 years ago
- Threadless shellcode injection tool☆63Updated 6 months ago
- ☆78Updated last year
- ☆115Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 2 months ago
- Mythic C2 Agent written in x64 PIC C☆67Updated 2 weeks ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Find DLLs with RWX section☆76Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- Execute dotnet app from unmanaged process☆69Updated last month
- ☆46Updated 2 years ago
- ☆122Updated 5 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 10 months ago