tylerdotrar / PoorMansArmory
Collection of malleable payloads and tools that will bypass AMSI, Windows Defender, and self-signed certificate checks.
☆24Updated last week
Alternatives and similar repositories for PoorMansArmory:
Users that are interested in PoorMansArmory are comparing it to the libraries listed below
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- UAC Bypass using CMSTP in Rust☆25Updated 3 months ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- execute PE in memory Filelessly☆32Updated last month
- Custom Python shellcode encryptor and obfuscator☆12Updated 11 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 10 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 3 months ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- ☆34Updated 11 months ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 9 months ago
- Cortex EDR Ransomware protection Bypass☆20Updated last month
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- A command and control framework.☆49Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- A port of classic netcat to C#☆31Updated 2 years ago
- a port of privkit bof for havoc☆23Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- .bin file to shellcode convertor☆34Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆59Updated 8 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- A python script that automates a C2 Profile build☆22Updated last week
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ☆54Updated 5 months ago
- Mythic C2 Agent written in x64 PIC C☆67Updated 2 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 9 months ago