Stracciatella
Bypass feature
A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
509 stars
14 watching
65 forks
Language: C#
last commit: over 2 years ago amsibypassopsecpowershellredteamsharppickunmanaged
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool to bypass Android's signature and permission checks for Inter-Process Communications (IPC) using Cydia Substrate. | 83 |
| Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution | 24 |
| Bypasses AppLocker restrictions in PowerShell to enable more advanced language functionality | 380 |
| A tool designed to bypass antivirus software and load malicious shellcode into processes | 177 |
| A proof-of-concept implementation of Gargoyle to bypass anti-cheat systems PeSieve and Moneta on 64-bit Windows | 250 |
| A tool to hide PowerShell scripts from security features by hooking .Net assemblies | 1,117 |
| An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
| PowerShell obfuscation script designed to bypass antivirus detection by modifying the behavior of existing PowerShell scripts | 1,447 |
| A Python-based tool that generates bypassed anti-virus detection code by performing XOR operations on shellcode | 52 |
| A tool for creating shellcode bypasses of antivirus software | 823 |
| Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 495 |
| Tools for exploiting vulnerabilities in Windows systems to facilitate lateral movement and code execution | 692 |
| A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| A collection of battle-tested PowerShell scripts for Cobalt Strike 4.0+ | 1,048 |
| An advanced in-memory evasion technique for hiding malicious code from scanners by fluctuating shellcode's memory protection and encrypting its contents. | 957 |