elastic / Silhouette
Keep it secret, keep it safe
☆75Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Silhouette
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆132Updated last year
- ☆68Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆48Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆138Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆137Updated last year
- ☆68Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆62Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆110Updated last year
- ☆83Updated 2 years ago
- Repo containing my public talks☆22Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆60Updated 2 years ago
- ☆55Updated last month
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 8 months ago
- Rust For Windows Cheatsheet☆110Updated 3 weeks ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- Hookers are cooler than patches.☆166Updated 2 years ago
- Small visualizator for PE files☆67Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- ☆41Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- It's pointy and it hurts!☆122Updated 2 years ago
- AAD related enumeration in Nim☆128Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago