Stracciatella
Bypass feature
A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
509 stars
14 watching
65 forks
Language: C#
last commit: about 3 years ago amsibypassopsecpowershellredteamsharppickunmanaged
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool to bypass Android's signature and permission checks for Inter-Process Communications (IPC) using Cydia Substrate. | 83 |
| | Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution | 24 |
| | Bypasses AppLocker restrictions in PowerShell to enable more advanced language functionality | 380 |
| | A tool designed to bypass antivirus software and load malicious shellcode into processes | 177 |
| | A proof-of-concept implementation of Gargoyle to bypass anti-cheat systems PeSieve and Moneta on 64-bit Windows | 250 |
| | A tool to hide PowerShell scripts from security features by hooking .Net assemblies | 1,117 |
| | An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
| | PowerShell obfuscation script designed to bypass antivirus detection by modifying the behavior of existing PowerShell scripts | 1,447 |
| | A Python-based tool that generates bypassed anti-virus detection code by performing XOR operations on shellcode | 52 |
| | A tool for creating shellcode bypasses of antivirus software | 823 |
| | Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 495 |
| | Tools for exploiting vulnerabilities in Windows systems to facilitate lateral movement and code execution | 692 |
| | A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
| | A collection of battle-tested PowerShell scripts for Cobalt Strike 4.0+ | 1,048 |
| | An advanced in-memory evasion technique for hiding malicious code from scanners by fluctuating shellcode's memory protection and encrypting its contents. | 957 |