WesleyWong420 / Build-Your-Own-LOLBins
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆20Updated last year
Related projects: ⓘ
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆56Updated 11 months ago
- ☆49Updated 10 months ago
- IAT Unhooking proof-of-concept☆26Updated 5 months ago
- ☆42Updated 2 months ago
- ☆50Updated this week
- ☆50Updated 11 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated 4 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆38Updated last year
- ☆24Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆18Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- ☆23Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆21Updated last week
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago
- ☆38Updated last year
- Attack chain emulator. Write recipes for initial access easily☆19Updated last year
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- ☆42Updated 2 months ago
- ☆45Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆70Updated last year
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- Decrypt GlobalProtect configuration and cookie files.☆74Updated last week
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆25Updated last week
- ☆50Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆57Updated 9 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago