vulnableone / BypassXLinks
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆28Updated last year
Alternatives and similar repositories for BypassX
Users that are interested in BypassX are comparing it to the libraries listed below
Sorting:
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- A python script that automates a C2 Profile build☆43Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆79Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 6 months ago
- Utilities for obfuscating shellcode☆71Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆78Updated 5 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆38Updated 8 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆120Updated 3 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆95Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- Find DLLs with RWX section☆81Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- A small How-To on creating your own weaponized WSL file☆101Updated 2 weeks ago
- Situational Awareness script to identify how and where to run implants☆56Updated 8 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆48Updated 2 months ago
- ☆57Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- Adversary Emulation Framework☆121Updated last month
- ☆132Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- Sniffing files generator☆59Updated 5 months ago
- ☆108Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆144Updated 11 months ago