sscoconutree / demontime
Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender
β15Updated last month
Alternatives and similar repositories for demontime:
Users that are interested in demontime are comparing it to the libraries listed below
- γπγProof of concept on BYOVD attackβ154Updated 2 months ago
- Use hardware breakpoint to dynamically change SSN in run-timeβ246Updated 10 months ago
- β250Updated last year
- PDF dropper Red Team Scenairosβ185Updated 7 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β180Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.β56Updated 8 months ago
- POC exploit for CVE-2024-49138β240Updated 2 weeks ago
- transform your payload into ipv4/ipv6/mac arraysβ165Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.β209Updated last year
- Shaco is a linux agent for havocβ156Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ259Updated 3 weeks ago
- β138Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijacβ¦β204Updated 4 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defenderβ26Updated 11 months ago
- Stealthily inject shellcode into an executableβ152Updated this week
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerabilityβ138Updated last month
- AV bypass while you sip your Chai!β218Updated 9 months ago
- Reflective DLL Injection Made Bellaβ218Updated last month
- β250Updated this week
- Attempt at Obfuscated version of SharpCollectionβ203Updated 2 weeks ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.β132Updated 9 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β194Updated 8 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detectionβ276Updated 9 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.β274Updated 9 months ago
- Generic PE loader for fast prototyping evasion techniquesβ227Updated 8 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASSβ250Updated 2 weeks ago
- Havoc C2 profile generatorβ71Updated 4 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ145Updated 5 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β150Updated 9 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighterβ115Updated last month