
Lists (32)
Sort Name ascending (A-Z)
AD
AdversorySimulation
asm windows
AV
C/cpp
C#/ps1
C2
Cloud
COM
Dll hijacking
EDR
🔮 Future ideas
go
HTB
IntialAccess
Linux kernel and macOS repo
LSASS | PPL | Kernel CallBack
MalwareAnalysis&RE
Resources related to Malware Analysis and REOffensive AI
OSCP
OSINT
post exp
RCE
RedTeam
Sanbox Evasion
shellcode
threatDetect
UAC Bypass
Win Platform Security feature
Credential Guard | CFG | PatchGuard | DSEWindows Kernel driver
Windows rootkit
windows syscall and Stack
Starred repositories
We found a way to DLL sideload with cleanmgr.exe
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
Reaping treasures from strings in remote processes memory
BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)
BloodyAD is an Active Directory Privilege Escalation Framework
This is a repository of resource about Malware techniques
Parse minidump files from system memory dumps using Ulf Frisk's vmm library
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
Automated Active Directory Lab deployable in AWS using ansible to practice delegation attacks using Linux and Windows machines.
Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html
Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijack execution flow
T-1 is a shellcode loader that leverages ML techniques to detect VM environments
A simple and fast anti-censorship tool written in Go
فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن
Extract and execute a PE embedded within a PNG file using an LNK file.
A tool for creating proxy dll for hijacking
Hunts out CobaltStrike beacons and logs operator command output
capt-meelo / CredMaster
Forked from knavesec/CredMasterRefactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling