- PoC & Guide: Windows EDR bypass through Kernel callbacks removal https://github.com/wavestone-cdt/EdrSandblast 7 comments netsec
Linking pages
- GitHub - Hackndo/lsassy: Extract credentials from lsass remotely https://github.com/Hackndo/lsassy 1 comment
- GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. https://github.com/infosecn1nja/Red-Teaming-Toolkit 1 comment
Linked pages
- Creative Commons — Attribution 4.0 International — CC BY 4.0 https://creativecommons.org/licenses/by/4.0/ 95 comments
- Bypassing Credential Guard – Team Hydra https://teamhydra.blog/2020/08/25/bypassing-credential-guard/ 13 comments
- GitHub - gentilkiwi/mimikatz: A little tool to play with Windows security https://github.com/gentilkiwi/mimikatz 12 comments
- Introducing Kernel Data Protection, a new platform security technology for preventing data corruption - Microsoft Security Blog https://www.microsoft.com/security/blog/2020/07/08/introducing-kernel-data-protection-a-new-platform-security-technology-for-preventing-data-corruption/ 1 comment
- Data Only Attack: Neutralizing EtwTi Provider - CNO Development Labs https://public.cnotools.studio/bring-your-own-vulnerable-kernel-driver-byovkd/exploits/data-only-attack-neutralizing-etwti-provider 0 comments
- Winbindex - The Windows Binaries Index https://winbindex.m417z.com/ 0 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - wavestone-cdt/EDRSandblast
See how to search.