beacon_hook_bypass_memscan
CASB bypass tool
Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution
works but not work, cao!
24 stars
3 watching
5 forks
Language: Rust
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code | 509 |
| Detects vulnerabilities in Content Security Policies | 163 |
| A proof-of-concept project demonstrating how to mask Beacon's payload execution in Cobalt Strike while executing a user-provided BOF. | 110 |
| Tools to bypass cobaltstrike beacon config scan vulnerability | 84 |
| A tool designed to bypass antivirus software and evade detection. | 691 |
| A tool to bypass Android's signature and permission checks for Inter-Process Communications (IPC) using Cydia Substrate. | 83 |
| A tool to detect memory-based evasion techniques used in malware and rootkits | 711 |
| A tool for detecting and parsing CobaltStrike beacon configuration from files or process memory. | 902 |
| Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| A tool that bypasses AMSI in a remote process with code injection. | 377 |
| A technique to bypass Windows UAC security restrictions using a DLL planting method for executing malicious code in high integrity processes. | 190 |
| Tool to check Rust crate API changes for semver violations during releases | 1,228 |
| Analyzes and dumps memory to extract sensitive information from running processes | 582 |
| A tool designed to bypass antivirus software and load malicious shellcode into processes | 177 |
| A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities | 82 |