Identifies the bytes that Microsoft Defender flags on.
☆102May 10, 2022Updated 3 years ago
Alternatives and similar repositories for DefenderCheck
Users that are interested in DefenderCheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Hunt for Malicious Strings☆1,378May 13, 2025Updated 11 months ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,323Aug 19, 2019Updated 6 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆257May 12, 2020Updated 5 years ago
- Extendable payload obfuscation and delivery framework☆144Nov 4, 2022Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆845Oct 3, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerSploit - A PowerShell Post-Exploitation Framework☆239Jan 26, 2022Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆244May 5, 2023Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,094Mar 22, 2024Updated 2 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- PowerShell Obfuscator☆4,245Aug 10, 2023Updated 2 years ago
- Microsoft signed ActiveDirectory PowerShell module☆1,016Oct 3, 2019Updated 6 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Sep 29, 2021Updated 4 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆219May 3, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆337Jan 16, 2022Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆749Jul 22, 2023Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- A centralized resource for previously documented WDAC bypass techniques☆619Sep 8, 2025Updated 7 months ago
- Tools for Kerberos PKINIT and relaying to AD CS☆896Jan 3, 2025Updated last year
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆905Apr 8, 2025Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆245Jul 14, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- ☆14Nov 29, 2021Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- "Golden" certificates☆716Aug 17, 2024Updated last year
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆99Mar 27, 2022Updated 4 years ago
- ☆27Jan 16, 2021Updated 5 years ago