trickster0 / EDR_DetectorLinks
EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.
☆95Updated 3 years ago
Alternatives and similar repositories for EDR_Detector
Users that are interested in EDR_Detector are comparing it to the libraries listed below
Sorting:
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Executables on Disk? Bleh 🤮☆110Updated 2 years ago
- Just some Rust process injector POCs, nothing weird.☆81Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆127Updated 3 years ago
- Command & Control server and agent written in Rust☆35Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆101Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 3 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- ☆88Updated 3 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆133Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆89Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆104Updated 4 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆101Updated 3 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆134Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆132Updated 2 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Updated 3 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 2 years ago
- ☆150Updated 2 years ago
- Kerberos protocol attacker☆139Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆220Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆74Updated 7 months ago
- ☆71Updated 3 years ago
- ☆245Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆244Updated last year
- (Demo) 3rd party agent for Havoc☆145Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Updated 2 years ago