roadwy / DefenderYara
Extracted Yara rules from Windows Defender mpavbase and mpasbase
☆318Updated 2 months ago
Alternatives and similar repositories for DefenderYara:
Users that are interested in DefenderYara are comparing it to the libraries listed below
- Aims to identify sleeping beacons☆526Updated last month
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆318Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆364Updated 5 months ago
- Simulate the behavior of AV/EDR for malware development training.☆460Updated 11 months ago
- AV/EDR Lab environment setup references to help in Malware development☆360Updated last month
- A beacon object file implementation of PoolParty Process Injection Technique.☆359Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆382Updated 6 months ago
- TartarusGate, Bypassing EDRs☆557Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆505Updated 2 weeks ago
- Kill AV/EDR leveraging BYOVD attack☆334Updated last year
- ☆227Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆895Updated 7 months ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆467Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆566Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆303Updated last year
- A Visual Studio template used to create Cobalt Strike BOFs☆288Updated 3 years ago
- ☆517Updated 10 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆561Updated 6 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆627Updated 2 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆445Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆427Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆262Updated 8 months ago
- ☆333Updated last month
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆464Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆181Updated 10 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆557Updated 6 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆241Updated 9 months ago
- Extract C2 Traffic☆249Updated last month
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆473Updated 11 months ago