elastic / Silhouette
Keep it secret, keep it safe
☆77Updated last month
Alternatives and similar repositories for Silhouette:
Users that are interested in Silhouette are comparing it to the libraries listed below
- a tiny program to consume from ETW providers for research☆46Updated 2 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- ☆69Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆123Updated 2 years ago
- AAD related enumeration in Nim☆129Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Yara Rules for Modern Malware☆74Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆72Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆141Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆72Updated last year
- ☆87Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆115Updated 6 months ago
- DEFCON30 Talk Material, References and Extra Bits☆37Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆140Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆138Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆92Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆62Updated 3 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆39Updated 6 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆39Updated last week
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- ☆80Updated 4 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- Tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆37Updated 5 months ago