t0-retooling / defender-recon24
☆52Updated 6 months ago
Alternatives and similar repositories for defender-recon24:
Users that are interested in defender-recon24 are comparing it to the libraries listed below
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆50Updated this week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆76Updated last year
- ☆139Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆71Updated this week
- ☆96Updated 3 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- ☆115Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆96Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆67Updated 3 years ago
- ☆68Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆66Updated 5 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆49Updated last year
- Unpacker for donut shellcode☆17Updated 4 years ago
- Proof-of-Concept for CVE-2024-26218☆51Updated 11 months ago
- Minifilter Callback Patching Proof-of-Concept☆67Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- ForsHops☆41Updated last month
- A Poc on blocking Procmon from monitoring network events☆101Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Golang bindings for PE-sieve☆43Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- ☆70Updated 2 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated 11 months ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆115Updated last year