BC-SECURITY / Beginners-Guide-to-Obfuscation
☆1,029Updated 9 months ago
Alternatives and similar repositories for Beginners-Guide-to-Obfuscation:
Users that are interested in Beginners-Guide-to-Obfuscation are comparing it to the libraries listed below
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,133Updated 8 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,822Updated 2 months ago
- ☆2,046Updated 2 years ago
- ☆1,595Updated 5 months ago
- The Hunt for Malicious Strings☆1,168Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,893Updated this week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,063Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆618Updated 6 months ago
- Powershell tool to automate Active Directory enumeration.☆1,058Updated last month
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,064Updated 10 months ago
- Some notes and examples for cobalt strike's functionality☆1,002Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,218Updated last year
- Windows Local Privilege Escalation from Service Account to System☆757Updated 4 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆677Updated 3 weeks ago
- Red Team Cheatsheet in constant expansion.☆1,162Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,252Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,071Updated 8 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,439Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,104Updated 2 months ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆930Updated 2 months ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆523Updated 7 months ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,098Updated 7 months ago
- ☆1,565Updated 8 months ago
- Windows Local Privilege Escalation Cookbook☆1,053Updated last month
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,508Updated 2 weeks ago
- Azure Security Resources and Notes☆1,517Updated 8 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,101Updated 8 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆897Updated 8 months ago
- Dumping DPAPI credz remotely☆1,070Updated 3 months ago
- The swiss army knife of LSASS dumping☆1,858Updated 5 months ago