- Berlin
- in/jasper-braack-5b3b67278
Highlights
- Pro
Stars
early cascade injection PoC based on Outflanks blog post, in rust
early cascade injection PoC based on Outflanks blog post
golang decryption poc of the new app bound encryption introduced in chrome version 127.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
NativePayload_RefPtr1 Indirect call csharp method in memory [without call c# method in source code directly]
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
📱 Track WhatsApp contacts' online activity in real-time. Get notifications, view history, and analyze patterns. Open-source, privacy-focused tool.
Dump cookies and credentials directly from Chrome/Edge process memory
Work around the go runtime to obfuscate part of the executable code in golang executables
Minimalistic library to scrape emails from websites with headless browser support.
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
not a reverse-engineered version of the Cobalt Strike Beacon
Multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the telegram proxy.
Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution
Classic Process Injection with Memory Evasion Techniques implemantation
Hide your P/Invoke signatures through other people's signed assemblies