zimnyaa / noWatch
Implant drop-in for EDR testing
☆135Updated last year
Alternatives and similar repositories for noWatch:
Users that are interested in noWatch are comparing it to the libraries listed below
- Simple BOF to read the protection level of a process☆115Updated last year
- ☆133Updated last year
- ☆119Updated last year
- ☆125Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆79Updated 2 years ago
- A simple BOF that frees UDRLs☆117Updated 2 years ago
- ☆98Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆103Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- ☆140Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- ☆142Updated 2 years ago
- ☆62Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- ☆96Updated 2 months ago
- ☆125Updated 6 months ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆92Updated 3 years ago
- Lockless BOF☆70Updated last month
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆122Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆82Updated 2 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆144Updated 2 years ago
- AzureAD beacon object files☆117Updated 3 months ago
- ☆139Updated 2 years ago
- ☆78Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆140Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago