vulnableone / BypassX
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆23Updated 6 months ago
Related projects: ⓘ
- Windows Thread Pool Injection Havoc Implementation☆26Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- A repository with my code snippets for research/education purposes.☆51Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆43Updated 4 months ago
- Brief writeup of post exploitation methodologies.☆17Updated 11 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated 6 months ago
- Construct the payload at runtime using an array of offsets☆59Updated 3 months ago
- A repo of scripts I find helpful for daily tasks.☆26Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 6 months ago
- Utilities for obfuscating shellcode☆38Updated 2 months ago
- Do some DLL SideLoading magic☆72Updated 11 months ago
- ☆57Updated 9 months ago
- Enumerate the Domain for Readable and Writable Shares☆15Updated 3 months ago
- A pure C version of SymProcAddress☆23Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆22Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆72Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆71Updated 5 months ago
- ☆23Updated last year
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆117Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆52Updated last month
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 9 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆104Updated 4 months ago
- Red Team Operation's Defense Evasion Technique.☆50Updated 3 months ago