jfmaes / blogposts-talks-and-tidbitsView external linksLinks
all random stuff that dont warrant a seperate repo
☆12Sep 2, 2022Updated 3 years ago
Alternatives and similar repositories for blogposts-talks-and-tidbits
Users that are interested in blogposts-talks-and-tidbits are comparing it to the libraries listed below
Sorting:
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆18Aug 15, 2023Updated 2 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Jul 11, 2023Updated 2 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆17Dec 20, 2024Updated last year
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 3 months ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- ☆19Sep 17, 2025Updated 4 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- POC for frustrating/defeating Malware Analysts☆158Jun 12, 2022Updated 3 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- ☆43Jan 2, 2023Updated 3 years ago
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- Password:ВсеБудеУкраїна☆16Mar 21, 2022Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Recon 2023 slides and code☆80Jun 9, 2023Updated 2 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 6 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- ☆23Apr 28, 2024Updated last year
- ☆22Aug 11, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- Most Responder's configuration power in your hand.☆53Jan 19, 2025Updated last year