BC-SECURITY / DEFCON27View external linksLinks
DEFCON 27 slides and workshop materials.
☆127Jun 29, 2020Updated 5 years ago
Alternatives and similar repositories for DEFCON27
Users that are interested in DEFCON27 are comparing it to the libraries listed below
Sorting:
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- Writing custom backdoor payloads with C# - Defcon 27 Workshop☆1,190Mar 18, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆239Nov 8, 2019Updated 6 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆202Oct 17, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ObscurityLabs RedTeam C# Toolkit☆124Sep 3, 2019Updated 6 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Dec 13, 2020Updated 5 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- The program is designed to obfuscate the shellcode.☆202Jul 13, 2021Updated 4 years ago
- Run Rubeus via Rundll32☆208Apr 25, 2020Updated 5 years ago
- ☆114Aug 5, 2020Updated 5 years ago
- Managed assembly shellcode generation☆280Mar 19, 2021Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Apr 17, 2019Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- MSBuildShell, a Powershell Host running within MSBuild.exe☆294Aug 2, 2019Updated 6 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago