zero2504 / EDR-GhostLockerLinks
AppLocker-Based EDR Neutralization
☆100Updated this week
Alternatives and similar repositories for EDR-GhostLocker
Users that are interested in EDR-GhostLocker are comparing it to the libraries listed below
Sorting:
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆94Updated 2 weeks ago
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- ☆159Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆135Updated 3 months ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆207Updated last month
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated 3 weeks ago
- A small How-To on creating your own weaponized WSL file☆118Updated 4 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- Commandline spoofing on Windows☆82Updated 3 weeks ago
- ☆138Updated last month
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- Obex – Blocking unwanted DLLs in user mode☆276Updated 3 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆133Updated 5 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆163Updated 4 months ago
- A Mythic Agent written in PIC C.☆206Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 5 months ago
- ☆108Updated last year
- Lateral Movement Bof with MSI ODBC Driver Install☆141Updated 2 months ago
- Shellcode loader☆97Updated last year
- A collection of position independent coding resources☆101Updated last month
- Generate an Alphabetical Polymorphic Shellcode☆133Updated 4 months ago
- A hoontr must hoont☆102Updated 3 weeks ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 7 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Activation Context Hijack☆169Updated 4 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆120Updated last month
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆130Updated 8 months ago