sidaf / moonshine
☆69Updated last year
Alternatives and similar repositories for moonshine:
Users that are interested in moonshine are comparing it to the libraries listed below
- ☆47Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆89Updated last year
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- Living Off the Foreign Land setup scripts☆64Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- ☆85Updated 2 years ago
- malleable profile generator GUI for Havoc☆56Updated last year
- ☆107Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆73Updated last year
- ☆43Updated 7 months ago
- Utilities for obfuscating shellcode☆51Updated 7 months ago
- ☆58Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- ☆64Updated 11 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- ☆48Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Serverless Redirector in various cloud vendor for red team☆71Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆93Updated 7 months ago
- ☆68Updated 6 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆112Updated 5 months ago
- Deploy a phishing infrastructure on the fly.☆67Updated last month