whydee86 / SnD_AMSI
Start new PowerShell without etw and amsi in pure nim
☆157Updated 3 years ago
Alternatives and similar repositories for SnD_AMSI:
Users that are interested in SnD_AMSI are comparing it to the libraries listed below
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆119Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆189Updated 9 months ago
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆192Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆229Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆241Updated 3 years ago
- ☆141Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆154Updated last year
- COFF and BOF Loader written in Nim☆174Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 2 years ago
- ☆159Updated 6 months ago
- D/Invoke implementation in Nim☆101Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- ☆69Updated 4 years ago
- Nim Payload Generation☆61Updated last year
- Hookers are cooler than patches.☆169Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- UI for creating LNKs☆104Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆295Updated last year
- ☆151Updated 3 months ago
- Collection of CobaltStrike beacon object files☆103Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆95Updated 3 years ago
- Simple C# implementation of PowerUpSQL☆95Updated 10 months ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- ADCS cert template modification and ACL enumeration☆136Updated last year