reveng007 / Learning-EDR-and-EDR_EvasionLinks
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
☆287Updated 5 months ago
Alternatives and similar repositories for Learning-EDR-and-EDR_Evasion
Users that are interested in Learning-EDR-and-EDR_Evasion are comparing it to the libraries listed below
Sorting:
- AV/EDR Lab environment setup references to help in Malware development☆418Updated 10 months ago
- ☆375Updated 2 years ago
- ☆329Updated 3 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆423Updated 7 months ago
- ☆330Updated 4 months ago
- Open Source C&C Specification☆277Updated 10 months ago
- Kill AV/EDR leveraging BYOVD attack☆383Updated 2 years ago
- ☆290Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆395Updated 3 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- Simulate the behavior of AV/EDR for malware development training.☆556Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆321Updated last year
- ☆164Updated 9 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Updated 2 years ago
- Find potential DLL Sideloads on your windows computer☆216Updated 11 months ago
- ☆302Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆133Updated 7 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 3 months ago
- ☆192Updated last year
- ☆409Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆252Updated 6 months ago
- ☆259Updated last year
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- RunPE implementation with multiple evasive techniques☆262Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆390Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Updated last year