DISREL / Conti-Leaked-Playbook-TTPs
MITRE TTPs derived from Conti's leaked playbooks from XSS.IS
☆37Updated 3 years ago
Alternatives and similar repositories for Conti-Leaked-Playbook-TTPs:
Users that are interested in Conti-Leaked-Playbook-TTPs are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 9 months ago
- ☆48Updated last year
- IAT Unhooking proof-of-concept☆29Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- ☆37Updated 11 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆38Updated 2 years ago
- Python module for running BOFs☆68Updated last year
- ☆57Updated 3 years ago
- Repo containing my public talks☆23Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last month
- ☆59Updated last year
- ☆22Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- ☆17Updated 4 months ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- ☆37Updated 2 years ago
- Utilities for obfuscating shellcode☆59Updated last month
- Grab unsaved Notepad contents with a Beacon Object File☆11Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago