FULLSHADE / WindowsExploitationResourcesLinks
Resources for Windows exploit development
☆1,583Updated 3 years ago
Alternatives and similar repositories for WindowsExploitationResources
Users that are interested in WindowsExploitationResources are comparing it to the libraries listed below
Sorting:
- List of Awesome Advanced Windows Exploitation References☆1,494Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,097Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,989Updated 11 months ago
- Research code & papers from members of vx-underground.☆1,244Updated 3 years ago
- ☆2,106Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,923Updated 6 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆661Updated 9 months ago
- ☆1,046Updated last year
- Writing custom backdoor payloads with C# - Defcon 27 Workshop☆1,144Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,808Updated 2 months ago
- Organized list of my malware development resources☆1,571Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,668Updated 3 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,175Updated 2 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆553Updated 10 months ago
- Identifies the bytes that Microsoft Defender flags on.☆2,450Updated last year
- A collection of links related to VMware escape exploits☆1,432Updated 9 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆809Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆808Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,669Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,557Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- Open-Source Shellcode & PE Packer☆1,958Updated last year
- A workshop about Malware Development☆1,667Updated 2 years ago
- Privilege Escalation Enumeration Script for Windows☆3,308Updated 3 weeks ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,180Updated 5 years ago
- Collection of Offensive C# Tooling☆1,426Updated 2 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,493Updated last week
- AV/EDR evasion via direct system calls.☆1,884Updated 2 years ago
- A curated list of awesome privilege escalation☆1,351Updated 11 months ago