Windows APT Warfare, published by Packt
☆75Mar 11, 2023Updated 3 years ago
Alternatives and similar repositories for Windows-APT-Warfare
Users that are interested in Windows-APT-Warfare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jan 12, 2022Updated 4 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated last year
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 11 months ago
- ☆19May 22, 2024Updated last year
- Home of https://redteam.guide☆15Apr 1, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Oct 31, 2022Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- ☆12Feb 19, 2026Updated 3 months ago
- ☆24Apr 30, 2023Updated 3 years ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆62Mar 4, 2026Updated 2 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆80Sep 8, 2025Updated 8 months ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- Scan your Windows computer for known vulnerable or malicious drivers.☆99Apr 29, 2026Updated 3 weeks ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NASM listing to shellcode converter☆14May 6, 2018Updated 8 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆27Apr 14, 2026Updated last month
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆35Apr 22, 2026Updated 3 weeks ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Apr 11, 2023Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆28Aug 11, 2023Updated 2 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆673Dec 23, 2022Updated 3 years ago
- Parse SDDL strings☆37Apr 1, 2024Updated 2 years ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- Now You See Me, Now You Don't☆1,046Jan 23, 2026Updated 3 months ago