roadwy / DefenderYara
Extracted Yara rules from Windows Defender mpavbase and mpasbase
☆378Updated last month
Alternatives and similar repositories for DefenderYara:
Users that are interested in DefenderYara are comparing it to the libraries listed below
- Aims to identify sleeping beacons☆575Updated 3 months ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆322Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆369Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆396Updated 7 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆571Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆911Updated 9 months ago
- Simulate the behavior of AV/EDR for malware development training.☆516Updated last year
- TartarusGate, Bypassing EDRs☆573Updated 3 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆481Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆394Updated 8 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆534Updated 2 months ago
- Collect Windows telemetry for Maldev☆322Updated last month
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆468Updated 2 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆464Updated last year
- ☆519Updated last year
- ☆352Updated 3 months ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆361Updated last year
- ☆236Updated 10 months ago
- CPP AV/EDR Killer☆396Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆220Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- Kill AV/EDR leveraging BYOVD attack☆344Updated last year
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆244Updated 3 years ago
- HookChain: A new perspective for Bypassing EDR Solutions☆506Updated 2 months ago
- Some POCs for my BYOVD research and find some vulnerable drivers☆183Updated 6 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆285Updated 10 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆308Updated last year
- Protected Process Dumper Tool☆533Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆374Updated last year
- Persistence by writing/reading shellcode from Event Log☆368Updated 2 years ago