corelan / CorelanTrainingLinks
Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training
☆30Updated 2 months ago
Alternatives and similar repositories for CorelanTraining
Users that are interested in CorelanTraining are comparing it to the libraries listed below
Sorting:
- extracts shellcode from a nasm compile macho binary☆16Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆64Updated last year
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆11Updated 5 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- C# User Simulation☆33Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- Different code-injections techniques under a common tool☆30Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆24Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Updated 5 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 6 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- Walking the PEB in VBA☆24Updated 5 years ago
- ☆19Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- ☆23Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Updated 4 years ago