vxCrypt0r / AMSI_VEH
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
☆157Updated 8 months ago
Alternatives and similar repositories for AMSI_VEH:
Users that are interested in AMSI_VEH are comparing it to the libraries listed below
- Bypass LSA protection using the BYODLL technique☆154Updated 5 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆313Updated last year
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- Generic PE loader for fast prototyping evasion techniques☆213Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆180Updated last year
- ☆139Updated 6 months ago
- A set of programs for analyzing common vulnerabilities in COM☆193Updated 5 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆283Updated last year
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- ☆122Updated 5 months ago
- ☆143Updated 2 months ago
- EDRSandblast-GodFault☆250Updated last year
- TypeLib persistence technique☆107Updated 3 months ago
- Patch AMSI and ETW☆236Updated 9 months ago
- An App Domain Manager Injection DLL PoC on steroids☆164Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆216Updated 2 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆249Updated 5 months ago
- ☆120Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆224Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆208Updated last year
- A Beacon Object File (BOF) template for Visual Studio☆167Updated 6 months ago
- Exploitation of process killer drivers☆196Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆180Updated last year