Lists (32)
Sort Name ascending (A-Z)
AD/ADCS
AdversorySimulation
asm windows
AV
C/cpp
C#/ps1
C2
Cloud
COM
DevSecOps
Dll hijacking
EDR
🔮 Future ideas
go
IntialAccess
Linux kernel and macOS repo
LSASS | CG | PPL | Kernel CalBak
MalwareAnalysis&RE
Resources related to Malware Analysis and REOffensive AI
OSINT
Pentest/Exploitation
post exp
RedTeam
SAAS/Oauth/PurpleTeam
Sanbox Evasion
shellcode
threatDetect
UAC Bypass
Win Platform Security feature
Credential Guard | CFG | PatchGuard | DSEWindows Kernel driver
Windows rootkit
windows syscall and Stack
Starred repositories
Decrypt SCCM and DPAPI secrets with Powershell.
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
A Beacon Object File (BOF) template for Visual Studio
a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
Collection of powershell scripts I used to complete my CARTP and CARTE courses.
Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
A tool that shows detailed information about named pipes in Windows
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
A Poc on blocking Procmon from monitoring network events
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
A C# implementation that disables Windows Firewall bypassing UAC
A C# implementation of dumping credentials from Windows Credential Manager
Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File
MeshAgent used along with MeshCentral to remotely manage computers. Many variations of the background management agent are included as binaries in the MeshCentral project.
A delicious, but malicious SSL-VPN server 🌮
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.