dosxuz / TradecraftImrprovement
This repository will contain source codes from the Tradecraft improvement blog series
☆14Updated 3 weeks ago
Alternatives and similar repositories for TradecraftImrprovement:
Users that are interested in TradecraftImrprovement are comparing it to the libraries listed below
- miscellaneous codes☆35Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆13Updated 3 months ago
- Rewrite to fit my needs☆27Updated 9 months ago
- A pure C version of SymProcAddress☆27Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- Deobfuscation of XorStringsNet☆14Updated 5 months ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆14Updated last month
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆26Updated 2 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆13Updated this week
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆36Updated last week
- ☆34Updated 3 weeks ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- ☆48Updated last year
- Proxy function calls through the thread pool with ease☆25Updated last month
- ☆29Updated 4 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆25Updated 11 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆14Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- BOF for C2 framework☆41Updated 5 months ago
- use python on windows with full submodule support without installation☆27Updated 3 months ago
- ☆19Updated 4 months ago
- Unhook Ntdll.dll, Go & C++.☆21Updated this week
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated 11 months ago
- A process injection technique using only thread context manipulation☆28Updated last year
- Installing wazuh SIEM Unified XDR and SIEM protection☆24Updated 3 months ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last month