vu-ls / CrassusLinks
☆596Updated 2 weeks ago
Alternatives and similar repositories for Crassus
Users that are interested in Crassus are comparing it to the libraries listed below
Sorting:
- Spartacus DLL/COM Hijacking Toolkit☆1,066Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆889Updated 9 months ago
- PoCs and tools for investigation of Windows process execution techniques☆941Updated last week
- Various ways to execute shellcode☆504Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆496Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆765Updated 11 months ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆571Updated 9 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,032Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆661Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆502Updated 5 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆718Updated 5 months ago
- ☆512Updated last year
- Aims to identify sleeping beacons☆635Updated 11 months ago
- Protected Process Dumper Tool☆568Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆493Updated last year
- A centralized resource for previously documented WDAC bypass techniques☆589Updated 2 months ago
- Lifetime AMSI bypass☆659Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,039Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆546Updated last year
- ☆771Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆579Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆734Updated 3 months ago
- ☆423Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆985Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆517Updated 5 months ago
- EDR Lab for Experimentation Purposes☆1,377Updated this week
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,009Updated last month
- DPAPI looting remotely and locally in Python☆529Updated last month
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆313Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆510Updated last year