chr0n1k / AH2021WorkshopLinks
Malware development for red teaming workshop
☆224Updated 4 years ago
Alternatives and similar repositories for AH2021Workshop
Users that are interested in AH2021Workshop are comparing it to the libraries listed below
Sorting:
- ☆196Updated last year
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆146Updated 3 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆392Updated last year
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆228Updated 4 years ago
- ☆413Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆315Updated last month
- Active Directory Labs/exams Review☆261Updated 4 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆179Updated 4 years ago
- ☆427Updated 5 years ago
- ☆289Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆255Updated 3 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆318Updated last month
- OSCP Cheatsheets☆99Updated 6 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆272Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆124Updated 4 years ago
- Bypass AMSI by patching AmsiScanBuffer☆278Updated 4 years ago
- CyberSec Blog☆98Updated last week
- Stop Defender Service using C# via Token Impersonation☆170Updated 3 years ago
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆408Updated 9 months ago
- ☆134Updated 2 years ago
- ☆167Updated 3 years ago
- A basic c2 / agent.☆120Updated 5 years ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆463Updated 4 years ago
- My collection of malware dev links☆304Updated 6 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- ☆428Updated 3 years ago
- Windows for Red Teamers☆127Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆286Updated 4 years ago
- ☆201Updated 6 years ago