☆101Mar 31, 2022Updated 3 years ago
Alternatives and similar repositories for avdebugger
Users that are interested in avdebugger are comparing it to the libraries listed below
Sorting:
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- ErebusGate for Nim Bypass AV/EDR☆162Nov 7, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆111Aug 7, 2025Updated 6 months ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆385Apr 16, 2022Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180May 4, 2022Updated 3 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆515Feb 1, 2024Updated 2 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆554Dec 3, 2023Updated 2 years ago
- ☆38Apr 15, 2025Updated 10 months ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- A little tool to play with the Seclogon service☆327Jul 10, 2022Updated 3 years ago
- ☆130Dec 4, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- ☆64May 31, 2024Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 6 months ago
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- Hide memory artifacts using ROP and hardware breakpoints.☆146Oct 20, 2023Updated 2 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆501Jan 25, 2022Updated 4 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- COFF and BOF Loader written in Nim☆175Aug 1, 2022Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆236Apr 12, 2022Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- ☆26Mar 10, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆622Sep 26, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Collection of extracted Microsoft Defender data for security research purposes☆233Jun 23, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆225May 3, 2023Updated 2 years ago
- ☆23Mar 6, 2023Updated 2 years ago