chr0n1k / AH2021WorkshopLinks
Malware development for red teaming workshop
☆224Updated 4 years ago
Alternatives and similar repositories for AH2021Workshop
Users that are interested in AH2021Workshop are comparing it to the libraries listed below
Sorting:
- ☆195Updated last year
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆177Updated 4 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆228Updated 4 years ago
- ☆288Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆146Updated 3 years ago
- Active Directory Labs/exams Review☆261Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆120Updated 4 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆390Updated last year
- ☆425Updated 5 years ago
- Bypass AMSI by patching AmsiScanBuffer☆277Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆254Updated 3 years ago
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆272Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated 2 weeks ago
- PowerShell Constrained Language Mode Bypass☆285Updated 4 years ago
- CyberSec Blog☆97Updated last month
- ☆412Updated 2 years ago
- ☆133Updated 2 years ago
- ☆200Updated 6 years ago
- ☆166Updated 3 years ago
- OSCP Cheatsheets☆99Updated 6 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- More examples using the Impacket library designed for learning purposes.☆267Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆97Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆407Updated 8 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆317Updated 3 weeks ago
- A basic c2 / agent.☆119Updated 5 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year