hvictor / targetserv-x64Links
Windows x64 Exploitation Training
☆15Updated 6 months ago
Alternatives and similar repositories for targetserv-x64
Users that are interested in targetserv-x64 are comparing it to the libraries listed below
Sorting:
- Sleep obfuscation in golang based on ekko☆13Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆136Updated 3 months ago
- vulnerable windows binaries for exploitation practice☆48Updated 3 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- ☆12Updated 2 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆104Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- ☆27Updated 3 years ago
- Internal Monologue BOF☆79Updated 11 months ago
- Attack chain emulator. Write recipes for initial access easily☆22Updated 9 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆135Updated 10 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 4 months ago
- Mockingjay process self injection POC☆42Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆124Updated 2 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 8 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆317Updated last month
- Rusty Impersonate☆102Updated 2 months ago
- ☆29Updated last year
- A Mythic Agent written in PIC C.☆203Updated 10 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- ☆109Updated 9 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆141Updated 4 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- ForsHops☆150Updated 8 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆43Updated last year