reveng007 / AMSI-patches-learned-till-nowLinks
I have documented all of the AMSI patches that I learned till now
☆73Updated 5 months ago
Alternatives and similar repositories for AMSI-patches-learned-till-now
Users that are interested in AMSI-patches-learned-till-now are comparing it to the libraries listed below
Sorting:
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆130Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- ☆124Updated last year
- ☆131Updated last year
- ☆87Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- ☆70Updated 3 years ago
- Simple BOF to read the protection level of a process☆118Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆72Updated 5 months ago
- Sleep Obfuscation☆45Updated 2 years ago
- ☆100Updated last year
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- ☆127Updated 2 years ago
- ☆137Updated 2 years ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 10 months ago
- ☆79Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- ☆110Updated 6 months ago
- Implant drop-in for EDR testing☆143Updated last year
- ☆90Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆130Updated 7 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆152Updated last month
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- ☆124Updated last year