vulnableone / BypassXLinks
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆28Updated last year
Alternatives and similar repositories for BypassX
Users that are interested in BypassX are comparing it to the libraries listed below
Sorting:
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆52Updated last month
- Cortex EDR Ransomware protection Bypass☆24Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆75Updated 2 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 3 months ago
- ☆56Updated 4 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆37Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆30Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- ☆46Updated 2 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- ☆55Updated 8 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆117Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- Sniffing files generator☆58Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆52Updated 2 months ago
- Enumerate Domain Users Without Authentication☆88Updated 2 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- ☆107Updated 4 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- ☆137Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- Dumping LSASS Evaded Endpoint Security Solutions☆13Updated 4 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated last week