elastic / SilhouetteLinks
Keep it secret, keep it safe
☆76Updated 5 months ago
Alternatives and similar repositories for Silhouette
Users that are interested in Silhouette are comparing it to the libraries listed below
Sorting:
- a tiny program to consume from ETW providers for research☆49Updated 6 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆122Updated 10 months ago
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- ☆69Updated last year
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆62Updated 6 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆20Updated 6 months ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆62Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆77Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Repo containing my public talks☆23Updated 2 years ago
- Socks5 / Socks4 client and server library☆70Updated last week
- ☆74Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- PowerShell PE Parser☆63Updated last year
- Repository of Volatility3 plugins☆22Updated 2 years ago
- Powershell Linter☆62Updated 2 weeks ago
- ☆23Updated last year
- ☆45Updated last year
- Windows eventlog formatting, live fetching and querying utility in C☆20Updated 5 years ago
- ☆67Updated 2 years ago