ChoiSG / kr-redteam-playbookLinks
오펜시브 시큐리티 TTP, 정보, 그리고 대응 방안을 분석하고 공유하는 프로젝트입니다. 정보보안 업계 종사자들과 학생들에게 도움이 되었으면 좋겠습니다.
☆74Updated 8 months ago
Alternatives and similar repositories for kr-redteam-playbook
Users that are interested in kr-redteam-playbook are comparing it to the libraries listed below
Sorting:
- BPFDoor Scanner - Check for Compromised Hosts☆42Updated 3 years ago
- BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen☆260Updated 3 years ago
- A collection of links related to Korean products hacking☆93Updated 3 months ago
- ☆11Updated 2 years ago
- ☆177Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Introduces the Republic of Korea's security documents recommended by CodeEngn.☆110Updated 3 months ago
- ☆46Updated last month
- ☆105Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated last year
- ☆120Updated last year
- ☆84Updated last year
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆170Updated 2 years ago
- ☆11Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- ☆38Updated 2 years ago
- ☆90Updated 2 years ago
- Windows APT Warfare, published by Packt☆75Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆113Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆161Updated this week
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- vulnerable windows binaries for exploitation practice☆47Updated 3 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆104Updated last year