elastic / SilhouetteLinks
Keep it secret, keep it safe
☆79Updated 10 months ago
Alternatives and similar repositories for Silhouette
Users that are interested in Silhouette are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆53Updated 11 months ago
- ☆70Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- Repo containing my public talks☆23Updated 2 years ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆65Updated 11 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Updated 3 years ago
- Socks5 / Socks4 client and server library☆71Updated last month
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- ☆23Updated 2 years ago
- ☆76Updated 3 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆55Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 9 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- ☆68Updated 3 years ago