elastic / SilhouetteLinks
Keep it secret, keep it safe
☆80Updated last year
Alternatives and similar repositories for Silhouette
Users that are interested in Silhouette are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆54Updated last year
- ☆70Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆66Updated last year
- ☆23Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆26Updated 4 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆44Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆142Updated 3 years ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- ☆18Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Updated 4 years ago
- CVE-2018-6066 using VBA☆68Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated last month
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago