freddiebarrsmith / Advanced-Windows-Exploit-Development-Practice
ASLR Evasion, Egghunters, SEH Overwrites
☆29Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Advanced-Windows-Exploit-Development-Practice
- Sp00fer blog post -☆25Updated 2 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Simple C2 over the Trello API☆37Updated last year
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- C2 and Post Exploitation Code☆34Updated 2 weeks ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆16Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆10Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆19Updated last year
- ☆16Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- powershell tool for VM evasion☆43Updated 4 years ago