elastic / SilhouetteLinks
Keep it secret, keep it safe
☆78Updated 7 months ago
Alternatives and similar repositories for Silhouette
Users that are interested in Silhouette are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆51Updated 8 months ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- ☆69Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- Repo containing my public talks☆23Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- PowerShell PE Parser☆63Updated last year
- Python DPAPI NG Decryptor for non-Windows Platforms☆63Updated 9 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- ☆74Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆60Updated 10 months ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- ☆23Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆45Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆66Updated 2 years ago
- ☆18Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆56Updated 6 months ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- ☆85Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago