trustedsec / SysWhispers
AV/EDR evasion via direct system calls.
☆32Updated 4 years ago
Alternatives and similar repositories for SysWhispers:
Users that are interested in SysWhispers are comparing it to the libraries listed below
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆88Updated 5 years ago
- ☆45Updated 4 years ago
- ☆92Updated 2 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 6 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆45Updated 3 years ago
- D/Invoke port of UrbanBishop☆106Updated 4 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆63Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- A logging ASKPASS binary☆29Updated 4 years ago
- ☆38Updated 6 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Suite of Shellcode Running Utilities☆107Updated 5 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆52Updated 6 years ago
- SMB Named Pipe shell☆63Updated 3 months ago
- ☆20Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago