vulnableone / BypassX
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆27Updated last year
Alternatives and similar repositories for BypassX:
Users that are interested in BypassX are comparing it to the libraries listed below
- A python script that automates a C2 Profile build☆22Updated last week
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- ☆54Updated last month
- Adversary Emulation Framework☆92Updated 8 months ago
- a port of privkit bof for havoc☆23Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆47Updated 10 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 9 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆112Updated 10 months ago
- Most Responder's configuration power in your hand.☆46Updated 2 months ago
- ForsHops☆63Updated this week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- ☆49Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆72Updated 3 weeks ago
- ☆104Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- Cortex EDR Ransomware protection Bypass☆20Updated last month
- Sliver extension to bypass UAC via cmstp written in rust☆25Updated 9 months ago
- Impacket pre-compiled binaries☆15Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆78Updated 8 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated last month
- ☆59Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year