RenderZ0n3 / Malware-Development
☆10Updated last year
Alternatives and similar repositories for Malware-Development:
Users that are interested in Malware-Development are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 5 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆23Updated 11 months ago
- ☆18Updated 4 months ago
- ☆23Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- ☆30Updated 2 years ago
- ☆14Updated 11 months ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆14Updated 4 years ago
- ☆25Updated 3 years ago
- ☆27Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- ☆14Updated last year
- Nemesis agent for Mythic☆27Updated 7 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 2 months ago
- A simple to use single-include Windows API resolver☆20Updated 9 months ago
- ☆20Updated last year
- ☆47Updated 2 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 5 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆27Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago