CronUp / EnAnalisis
☆37Updated 2 weeks ago
Related projects: ⓘ
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A PoC for achieving persistence via push notifications on Windows☆43Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- A collection of PoCs for different injection techniques on Windows!☆41Updated last year
- Hive v5 file decryption algorithm☆34Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- Repository for archiving Cobalt Strike configuration☆28Updated this week
- My Malware Analysis Reports☆18Updated 2 years ago
- ☆23Updated last year
- IAT Unhooking proof-of-concept☆26Updated 5 months ago
- ☆26Updated last month
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- ☆50Updated 5 months ago
- ☆50Updated 11 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated 4 months ago
- ☆38Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Configuration Extractors for Malware☆51Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last year
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆23Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Just my findings of malwares☆39Updated 2 years ago
- ☆46Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆82Updated 2 years ago
- ☆49Updated 10 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆41Updated 2 years ago