edr-bypass topic
Chimera
Automated DLL Sideloading Tool With EDR Evasion Capabilities
lolbin-poc
Small PoC of using a Microsoft signed executable as a lolbin.
SideloadFinder
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR'...
RedTeamOps-Havoc-101
Materials for the workshop "Red Team Ops: Havoc 101"
MinifilterHook
silence file system monitoring components by hooking their minifilters
DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Direct-Syscalls-vs-Indirect-Syscalls
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
hw-call-stack
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
PowerJoker
PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
Direct-Syscalls-A-journey-from-high-to-low
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).