vulnableone / BypassXLinks
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆27Updated last year
Alternatives and similar repositories for BypassX
Users that are interested in BypassX are comparing it to the libraries listed below
Sorting:
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- ☆135Updated 7 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- a port of privkit bof for havoc☆23Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 4 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- ☆123Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆114Updated 2 months ago
- Find DLLs with RWX section☆81Updated 2 years ago
- ☆152Updated last year
- Do some DLL SideLoading magic☆86Updated 2 years ago
- Mockingjay process self injection POC☆39Updated 2 years ago
- Impersonate Tokens using only NTAPI functions☆80Updated 5 months ago
- A python script that automates a C2 Profile build☆44Updated 2 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 9 months ago
- ☆157Updated 9 months ago
- ☆134Updated 2 weeks ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆187Updated 7 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆183Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆115Updated 3 weeks ago
- ☆146Updated 4 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆173Updated 6 months ago
- Tools I use on red team engagements and more☆33Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 9 months ago
- A Mythic Agent written in PIC C.☆199Updated 7 months ago
- Adversary Emulation Framework☆123Updated 2 months ago