elastic / Silhouette
Keep it secret, keep it safe
☆77Updated last year
Alternatives and similar repositories for Silhouette:
Users that are interested in Silhouette are comparing it to the libraries listed below
- a tiny program to consume from ETW providers for research☆45Updated 2 weeks ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆118Updated 2 years ago
- ☆71Updated 2 years ago
- ☆68Updated last year
- Powershell Linter☆49Updated last month
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆112Updated 4 months ago
- ☆83Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 8 months ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆135Updated last year
- ☆155Updated 8 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆49Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆115Updated 7 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- AAD related enumeration in Nim☆128Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆139Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆33Updated 3 months ago
- Utilities for obfuscating shellcode☆49Updated 6 months ago
- Execute PowerShell code at the antimalware-light protection level.☆140Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- All kinds of tiny shells☆58Updated last year
- Experiment on reproducing Obfuscate & Sleep☆140Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 9 months ago
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆68Updated last year
- Dump objects from .NET dumps.☆48Updated 2 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆51Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆185Updated 3 years ago
- Your syscall factory☆122Updated this week