f1rehaz4rd / Project-Iroh
Offensive Windows security tooling that allows for persistance to the operating system.
☆10Updated 3 years ago
Alternatives and similar repositories for Project-Iroh:
Users that are interested in Project-Iroh are comparing it to the libraries listed below
- DLL Injector as a service that watches the health of the started thread.☆9Updated 4 years ago
- Custom SOCKS proxy for redteam☆12Updated 2 years ago
- autopwn + deployment☆15Updated 2 years ago
- Raw socket library/framework for red team events☆35Updated last year
- Winlogon and LSA Notification Password Filters☆18Updated last year
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆23Updated 8 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆17Updated 3 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆11Updated 2 months ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 2 years ago
- ☆15Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- pypykatz plugin for volatility3 framework☆39Updated 9 months ago
- In 'n Out - See what goes in and comes out of PEs☆33Updated 2 years ago
- Python module for running BOFs☆64Updated last year
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- ☆38Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆47Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆24Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago