sscoconutree / demontime
Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender
☆17Updated 3 months ago
Alternatives and similar repositories for demontime:
Users that are interested in demontime are comparing it to the libraries listed below
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- Malicious powershell scripts loader designed to avoid detection.☆50Updated last year
- Evasive Golang Loader☆131Updated 8 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆17Updated last year
- ☆150Updated 8 months ago
- ☆137Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆196Updated 10 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆196Updated last week
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆47Updated last week
- TeamServer and Client of Exploration Command and Control Framework☆120Updated this week
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆117Updated 2 months ago
- 「💀」Proof of concept on BYOVD attack☆157Updated 4 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆185Updated last year
- Reflective DLL Injection Made Bella☆225Updated 3 months ago
- Havoc C2 profile generator☆77Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆153Updated 3 weeks ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆87Updated this week
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆39Updated last year
- ☆256Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- AV bypass while you sip your Chai!☆219Updated 10 months ago
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- PDF dropper Red Team Scenairos☆202Updated 8 months ago
- Stealthily inject shellcode into an executable☆164Updated last month
- Chrome browser extension-based Command & Control☆111Updated last month
- transform your payload into ipv4/ipv6/mac arrays☆173Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆50Updated 3 months ago