audibleblink / amnesiaLinks
Takes unallocated memory and fills it with junk to mess with forensics tools.
☆13Updated last year
Alternatives and similar repositories for amnesia
Users that are interested in amnesia are comparing it to the libraries listed below
Sorting:
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- The best way to send emails in Go.☆12Updated 4 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- DNS server for pentesters☆50Updated last month
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Network Finger Printer☆16Updated 8 years ago
- wordlists for password cracking☆28Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 3 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated 5 months ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- ☆24Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 5 years ago
- ☆11Updated 6 years ago
- ☆17Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 5 years ago
- Offensive go lang series☆35Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 5 years ago
- ☆18Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 7 years ago