
- United States
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Hide shellcode by shuffling bytes into a random array and reconstruct at runtime
ROP-based sleep obfuscation to evade memory scanners
Adaptive DLL hijacking / dynamic export forwarding
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Dump system call codes, names, and offsets from Ntdll.dll
AV/EDR Evasion Lab for Training & Learning Purposes
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.
Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven
C++ self-Injecting dropper based on various EDR evasion techniques.
A simple markdown to website generator written in C++.
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
RunasCs - Csharp and open version of windows builtin runas.exe
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.