Immersive-Labs-Sec / HavocC2-ForensicsLinks
A set of tools and resources for analysis of Havoc C2
☆19Updated last year
Alternatives and similar repositories for HavocC2-Forensics
Users that are interested in HavocC2-Forensics are comparing it to the libraries listed below
Sorting:
- ☆161Updated 6 months ago
- The different ways to dump lsass☆117Updated last month
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated 3 weeks ago
- ☆156Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆97Updated 3 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆68Updated 4 months ago
- Collection of codes focused on Linux rootkits☆153Updated this week
- Bypass user-land hooks by syscall tampering via the Trap Flag☆115Updated 3 weeks ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 5 months ago
- Utilities for obfuscating shellcode☆91Updated this week
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆103Updated 3 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆79Updated 3 weeks ago
- ☆37Updated 9 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- ☆69Updated 7 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆111Updated last week
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- POC of GITHUB simple C2 in rust☆52Updated last month
- Convert your shellcode into an ASCII string☆114Updated 2 months ago
- ☆80Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆72Updated 9 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 6 months ago
- ☆154Updated 5 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆72Updated 2 months ago
- ☆105Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆84Updated 7 months ago
- PoC that downloads an executable from a public SSL certificate☆128Updated last month
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆87Updated 4 months ago