Windows APT Warfare, published by Packt
☆75Mar 11, 2023Updated 3 years ago
Alternatives and similar repositories for Windows-APT-Warfare
Users that are interested in Windows-APT-Warfare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jan 12, 2022Updated 4 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 10 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- ☆17May 22, 2024Updated last year
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆55Mar 4, 2026Updated 3 weeks ago
- Home of https://redteam.guide☆15Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Oct 31, 2022Updated 3 years ago
- ☆34May 14, 2018Updated 7 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- ☆12Feb 19, 2026Updated last month
- ☆24Apr 30, 2023Updated 2 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆95Dec 2, 2025Updated 3 months ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Apr 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Now You See Me, Now You Don't☆1,034Jan 23, 2026Updated 2 months ago
- Full DLL Hooking, phrack 65☆53Aug 11, 2023Updated 2 years ago