f1rehaz4rd / Project-IrohLinks
Offensive Windows security tooling that allows for persistance to the operating system.
☆10Updated 4 years ago
Alternatives and similar repositories for Project-Iroh
Users that are interested in Project-Iroh are comparing it to the libraries listed below
Sorting:
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- DLL Injector as a service that watches the health of the started thread.☆9Updated 5 years ago
- Attack chain emulator. Write recipes for initial access easily☆22Updated 4 months ago
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- C++ function that will automagically unhook a specified Windows API☆63Updated 4 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- ☆74Updated 2 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- Python module for running BOFs☆71Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆85Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆42Updated 2 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆113Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- ☆82Updated 10 months ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- maldev obviously☆26Updated 2 months ago
- ☆55Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆39Updated 4 years ago
- ☆26Updated 4 years ago
- ☆14Updated 3 years ago