HuskyHacks / the-crown-defcon615
Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk
☆44Updated 2 years ago
Alternatives and similar repositories for the-crown-defcon615:
Users that are interested in the-crown-defcon615 are comparing it to the libraries listed below
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- Repository for slide decks of public talks I've given.☆14Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 10 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆37Updated 8 months ago
- ☆38Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆23Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Smart Card PIN swiping DLL☆77Updated 4 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- IAT Unhooking proof-of-concept☆29Updated 9 months ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆20Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- ☆16Updated 3 months ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago