tomcarver16 / AmsiHook
AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.
☆64Updated 4 years ago
Alternatives and similar repositories for AmsiHook:
Users that are interested in AmsiHook are comparing it to the libraries listed below
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Get or remove RunMRU values☆54Updated 5 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆96Updated 3 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆22Updated 2 years ago
- ☆68Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆117Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆47Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- AMSI Bypass Via the Heap☆106Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆84Updated 4 years ago
- Remove API hooks from a Beacon process.☆57Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆92Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆86Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- RDPThief donut shellcode inject into mstsc☆83Updated 3 years ago
- ☆56Updated 4 years ago
- ☆62Updated 3 years ago
- ☆25Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- ☆37Updated 2 years ago