trickster0 / EDR_DetectorLinks
EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.
โ95Updated 3 years ago
Alternatives and similar repositories for EDR_Detector
Users that are interested in EDR_Detector are comparing it to the libraries listed below
Sorting:
- Just some Rust process injector POCs, nothing weird.โ81Updated 3 years ago
- Executables on Disk? Bleh ๐คฎโ105Updated 2 years ago
- Command & Control server and agent written in Rustโ34Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projectsโ147Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniquesโ220Updated 3 years ago
- Shellcode loader designed for evasion. Coded in Rust.โ133Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.โ147Updated last year
- Convert shellcode generated using pe_2_shellcode to cdb format.โ99Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDRโ104Updated 4 years ago
- โ88Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memoryโ160Updated 4 years ago
- POC tools for exploring SMB over QUIC protocolโ127Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.โ244Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLLโ65Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.โ110Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally โฆโ88Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX sectionโ106Updated 2 years ago
- DLL Hijack Search Order Enumeration BOFโ150Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programsโ96Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog โฆโ87Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platformsโ130Updated 2 years ago
- ๐พDogwalk PoC (using diagcab file to obtain RCE on windows)โ79Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.โ53Updated 4 years ago
- Windows MSI Installer LPE (CVE-2021-43883)โ77Updated 3 years ago
- Your syscall factoryโ124Updated 2 weeks ago
- โ245Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionโ146Updated last year
- AV/EDR evasion via direct system calls.โ108Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.โ149Updated 3 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Serviceโ133Updated 3 years ago