ambray / ASM-Course
☆25Updated 5 years ago
Alternatives and similar repositories for ASM-Course:
Users that are interested in ASM-Course are comparing it to the libraries listed below
- ☆24Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆12Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆36Updated 5 years ago
- ☆26Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆49Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- ☆26Updated 6 years ago
- ☆43Updated 6 years ago
- ☆32Updated 7 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆50Updated 6 years ago
- ☆16Updated 3 years ago
- ☆51Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago