volexity / donut-decryptorLinks
Retrieve inner payloads from Donut samples
☆111Updated last year
Alternatives and similar repositories for donut-decryptor
Users that are interested in donut-decryptor are comparing it to the libraries listed below
Sorting:
- Windows Persistence IT-Security☆106Updated 8 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 7 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- ☆120Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆104Updated last year
- Local & remote Windows DLL Proxying☆168Updated last year
- ☆159Updated 11 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆132Updated this week
- ☆80Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 10 months ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆249Updated last month
- ☆88Updated 2 years ago
- .NET tool used to enrich RPC telemetry☆99Updated 5 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- ☆108Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated 11 months ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆76Updated 2 weeks ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆50Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- Tools for analyzing EDR agents☆269Updated last year
- ☆105Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year