BlackSnufkin / OdinEye
Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OdinEye
- Lifetime AMSI bypass.☆36Updated 4 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆32Updated last month
- ☆50Updated 6 months ago
- A pure C version of SymProcAddress☆23Updated 7 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 4 months ago
- exfiltration/infiltration toolkit☆23Updated 10 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 5 months ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆48Updated last month
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- Simple C2 using GitHub repository as comms channel.☆25Updated 2 weeks ago
- Sniffing files generator☆27Updated this week
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Bloodhound agent for Mythic☆14Updated 2 months ago
- A user enumeration tool for Slack.☆23Updated 5 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 4 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆23Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- ☆43Updated 4 months ago
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- ☆35Updated 2 weeks ago
- ☆15Updated last year
- Automatically deploy Nemesis☆19Updated 4 months ago
- ☆42Updated 2 weeks ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Just another Process Injection using Process Hollowing technique.☆16Updated last year