xM0kht4r / AV-EDR-KillerView external linksLinks
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
☆217Jan 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for AV-EDR-Killer
Users that are interested in AV-EDR-Killer are comparing it to the libraries listed below
Sorting:
- ☆48Nov 26, 2025Updated 2 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 3 months ago
- ☆55May 31, 2025Updated 8 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆42Nov 4, 2025Updated 3 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Jan 4, 2026Updated last month
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆87Jan 5, 2026Updated last month
- ☆18Sep 1, 2025Updated 5 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 7 months ago
- A malicous Golang Package☆15Apr 21, 2025Updated 9 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 3 weeks ago
- ☆59Oct 24, 2024Updated last year
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆153Feb 2, 2026Updated 2 weeks ago
- Execute shellcode via ASPNET compiler☆61Oct 2, 2025Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆234Feb 9, 2026Updated last week
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- A YARA rule generator☆61Feb 8, 2026Updated last week
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- Simple HTTP async comms using standard GET/POST requests☆46Feb 5, 2026Updated last week
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 2 months ago
- Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integrati…☆48Dec 30, 2025Updated last month
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆150Nov 23, 2025Updated 2 months ago
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆202Dec 8, 2025Updated 2 months ago
- Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation☆336Feb 2, 2026Updated 2 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 6 months ago
- ☆43Jan 2, 2023Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Shellcode injection using the Windows Debugging API☆165Jan 4, 2026Updated last month
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆25Mar 7, 2023Updated 2 years ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆63Apr 2, 2025Updated 10 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆63Jan 21, 2025Updated last year
- Inject DLLs into the explorer process using icons☆403May 18, 2025Updated 8 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆219Nov 3, 2025Updated 3 months ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- ☆14Apr 6, 2025Updated 10 months ago