t0-retooling / defender-recon24Links
☆52Updated 9 months ago
Alternatives and similar repositories for defender-recon24
Users that are interested in defender-recon24 are comparing it to the libraries listed below
Sorting:
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆100Updated this week
- ☆96Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆73Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆103Updated 2 years ago
- ☆143Updated 3 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆81Updated 2 years ago
- ETW based POC to identify direct and indirect syscalls☆187Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆104Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆81Updated last week
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- Detect strange memory regions and DLLs☆185Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated 2 months ago
- A few examples of how to trap virtual memory access on Windows.☆32Updated 7 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆57Updated 3 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆72Updated 8 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated 2 years ago
- Inter-Process Communication Mechanisms☆28Updated 4 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated last month
- ☆111Updated 2 years ago
- Analysis of the vulnerability☆51Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 5 months ago
- ☆32Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆20Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆50Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year