RITRedteam / nosferatu
Windows NTLM Authentication Backdoor
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for nosferatu
- It's what all the kids are talking about☆12Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆13Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- A simple Linux in-memory .so loader☆27Updated last year
- API Hammering with C++20☆34Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- idk man this was the default github name☆35Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- using the gpu to hide your payload☆47Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- Collection of Rust repos useful for Red Teamers.☆30Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆38Updated last year
- Dangling COM Keys Finder☆14Updated 3 years ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆59Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 4 months ago
- A simple PE loader.☆25Updated last year
- Simple and sane compression wrapper library.☆18Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- ☆37Updated 3 years ago