vulnableone / BypassXLinks
The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.
☆27Updated last year
Alternatives and similar repositories for BypassX
Users that are interested in BypassX are comparing it to the libraries listed below
Sorting:
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆100Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆119Updated 6 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆108Updated 2 weeks ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- ☆137Updated 10 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆119Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆181Updated 3 weeks ago
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆97Updated last month
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆214Updated 2 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Internal Monologue BOF☆79Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- ☆122Updated 2 years ago
- A hoontr must hoont☆100Updated last month
- ☆151Updated 2 years ago
- Shellcode injection using the Windows Debugging API☆124Updated this week
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆100Updated 8 months ago
- adws enumeration bof☆160Updated 3 months ago
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆89Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆58Updated last year
- ☆159Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆182Updated 9 months ago