DISREL / Conti-Leaked-Playbook-TTPs
MITRE TTPs derived from Conti's leaked playbooks from XSS.IS
☆37Updated 3 years ago
Alternatives and similar repositories for Conti-Leaked-Playbook-TTPs:
Users that are interested in Conti-Leaked-Playbook-TTPs are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 10 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 8 months ago
- ☆22Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Repo containing my public talks☆23Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- IAT Unhooking proof-of-concept☆29Updated 11 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated 3 weeks ago
- ☆37Updated 11 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Discord C2 Profile for Mythic☆28Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆14Updated 2 months ago
- Utilities for obfuscating shellcode☆54Updated last week
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Python module for running BOFs☆70Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆48Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- quASAR: ASAR manipulation made easy☆31Updated 2 years ago
- ☆26Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- ☆59Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆79Updated 2 years ago
- ☆38Updated last year
- Detect userland hooks placed by AV/EDR☆27Updated last year