Asienwald / DISM-NotesLinks
All DISM lecture/note materials
☆19Updated 4 years ago
Alternatives and similar repositories for DISM-Notes
Users that are interested in DISM-Notes are comparing it to the libraries listed below
Sorting:
- CVE's we discovered along the way☆17Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- A list of windows potatoes!☆26Updated 3 years ago
- Curated list of well-developed C# Offensive Tools☆20Updated 6 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- A Basic Java Application Vulnerable to the Log4Shell RCE☆42Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆86Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 3 years ago
- A basic c2 / agent.☆118Updated 5 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Updated last year
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Local Privilege Escalation Miner☆32Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆144Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- ☆33Updated 3 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆32Updated 2 years ago
- Powershell script to automate finding privilege escalation vectors in windows environments.☆16Updated 6 years ago
- An HTTP Reverse Shell in Python☆82Updated 2 years ago
- My new C2 framework☆40Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Updated 3 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Updated 3 years ago