0xCD4 / Projects
☆18Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for Projects
- MacroExploit use in excel sheet☆20Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆17Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- ☆13Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated 11 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- ☆25Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- ☆21Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 8 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Cobalt Strike BOFS☆16Updated 11 months ago
- ☆10Updated 2 weeks ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- LNK-Dropper Builder☆16Updated 2 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated 11 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 3 months ago
- ☆15Updated 8 months ago
- ☆50Updated 7 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- An offensive security framework for writing payloads☆15Updated 2 years ago
- ☆35Updated 11 months ago
- ECC Public Key Cryptography☆36Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆25Updated last year