Immersive-Labs-Sec / HavocC2-ForensicsLinks
A set of tools and resources for analysis of Havoc C2
☆26Updated last year
Alternatives and similar repositories for HavocC2-Forensics
Users that are interested in HavocC2-Forensics are comparing it to the libraries listed below
Sorting:
- ☆164Updated 9 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆121Updated 7 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated last month
- ☆159Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆136Updated 4 months ago
- The different ways to dump lsass☆203Updated 4 months ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- Permanently disable EDRs as local admin☆123Updated last week
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Utilities for obfuscating shellcode☆96Updated 3 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated 11 months ago
- ☆108Updated last year
- ☆151Updated 2 months ago
- ☆71Updated 11 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 10 months ago
- Windows Administrator level Implant.☆50Updated last year
- ☆43Updated last year
- Execute shellcode via ASPNET compiler☆59Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 6 months ago
- This is practice VM for malware development☆170Updated last month
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- ☆24Updated 10 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago