zimnyaa / noWatch
Implant drop-in for EDR testing
☆134Updated last year
Alternatives and similar repositories for noWatch:
Users that are interested in noWatch are comparing it to the libraries listed below
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆115Updated last year
- ☆61Updated 2 years ago
- ☆138Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆90Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- A simple BOF that frees UDRLs☆115Updated 2 years ago
- ☆134Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 2 months ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆121Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆101Updated last year
- ☆123Updated last year
- AzureAD beacon object files☆109Updated 2 months ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆136Updated 2 years ago
- ☆142Updated 2 years ago
- ☆94Updated last month
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆73Updated last month
- ☆97Updated last year
- ☆75Updated last year
- ☆127Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆91Updated 3 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year
- ☆93Updated 5 months ago
- ☆139Updated 2 years ago
- ☆122Updated 5 months ago
- ☆28Updated 5 months ago