BlackSnufkin / OdinEye
Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OdinEye
- A pure C version of SymProcAddress☆23Updated 8 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- ☆37Updated 3 weeks ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆50Updated 7 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆16Updated 3 weeks ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆51Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Docker container for running CobaltStrike 4.10☆33Updated 2 months ago
- ☆58Updated 11 months ago
- Bloodhound agent for Mythic☆15Updated 2 months ago
- Detect userland hooks placed by AV/EDR☆26Updated last year
- Automatically deploy Nemesis☆19Updated 5 months ago
- ☆44Updated 3 weeks ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Sliver agents for Mythic☆35Updated this week
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Utilities for obfuscating shellcode☆45Updated 4 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- Unhook Ntdll.dll, Go & C++.☆13Updated 4 months ago