vaishnavucv / Project-winEvasion-RedteamLinks
Project build for joel and joshua students from Germany | course: Advanced Tactics in information security
☆27Updated last year
Alternatives and similar repositories for Project-winEvasion-Redteam
Users that are interested in Project-winEvasion-Redteam are comparing it to the libraries listed below
Sorting:
- ☆27Updated 3 months ago
- A pure C version of SymProcAddress☆30Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Updated last year
- Turn your Raspberry Pi Pico into a hacking device☆12Updated last year
- ☆27Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Updated 5 months ago
- ☆21Updated 3 weeks ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Inject shellcode into a valid BMP/GIF image.☆34Updated 5 years ago
- ☆30Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Misery Loader to bypass modern EDR solutions☆17Updated last year
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- ☆17Updated 8 months ago
- ☆15Updated 10 months ago
- ☆59Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14Updated 8 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Updated 5 months ago
- Demoting PPL anti-malware services to less than a guest user☆65Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- Windows Administrator level Implant.☆50Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- ☆16Updated 7 months ago
- An offensive security framework for writing payloads☆18Updated 3 years ago