xiosec / TerminatorLinks
PowerShell script to terminate protected processes such as anti-malware and EDRs.
☆27Updated 2 years ago
Alternatives and similar repositories for Terminator
Users that are interested in Terminator are comparing it to the libraries listed below
Sorting:
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 7 months ago
- C# havoc implant☆101Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆108Updated 5 months ago
- Reasonably undetected shellcode stager and executer.☆37Updated 2 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- ☆90Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆89Updated 4 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆68Updated 3 months ago
- Lateral Movement☆124Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆98Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 8 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 9 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆82Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- PoC-Malware-TTPs☆49Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Updated last year
- ☆56Updated last year
- A collection of (even more) alternative shellcode callback methods in CSharp☆74Updated 9 months ago
- Do some DLL SideLoading magic☆85Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆79Updated 2 years ago