xforcered / WFHLinks
☆189Updated 2 years ago
Alternatives and similar repositories for WFH
Users that are interested in WFH are comparing it to the libraries listed below
Sorting:
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆193Updated 3 years ago
- ☆208Updated 3 years ago
- ☆388Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆261Updated 4 years ago
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Load any Beacon Object File using Powershell!☆251Updated 3 years ago
- ☆380Updated 2 years ago
- ☆216Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆338Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 3 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆129Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆214Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆310Updated 5 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆418Updated 2 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Bring your own print driver privilege escalation tool☆250Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆86Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆191Updated 2 years ago
- ☆151Updated 3 months ago
- Fully modular persistence framework☆256Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 4 years ago
- ☆98Updated 7 months ago
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆247Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆389Updated last year