Lists (1)
Sort Name ascending (A-Z)
Stars
using graph proxy to monitor teams user presence
tool for identifying guest relationships between companies
AIL framework - Analysis Information Leak framework
Golang search engine scraper intended for identification of published ClickOnce deployments
A tool for converting SysWhispers3 syscalls for use with Nim projects
Collection of various malicious functionality to aid in malware development
ASkyeye / Mangle
Forked from optiv/MangleMangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
Manage user privileges on a local machine or view applied privileges on local or remote system
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
Playing with PE's and Building Structures by Hand
StandIn is a small .NET35/45 AD post-exploitation toolkit
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.
Defences against Cobalt Strike
PowerForensics provides an all in one platform for live disk forensic analysis
Shellcode wrapper with encryption for multiple target languages
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!