HuskyHacks / the-crown-defcon615
Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk
☆44Updated 3 years ago
Alternatives and similar repositories for the-crown-defcon615:
Users that are interested in the-crown-defcon615 are comparing it to the libraries listed below
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ☆37Updated 9 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- ☆38Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Repository for slide decks of public talks I've given.☆14Updated last year
- ☆23Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 7 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated last year
- ☆24Updated 3 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆55Updated 2 years ago
- WMI SA stuffs☆29Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆36Updated 3 years ago
- IAT Unhooking proof-of-concept☆29Updated 10 months ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- ☆47Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago