kozmer / silentpulseLinks
single-threaded event driven sleep obfuscation poc for linux
☆35Updated last month
Alternatives and similar repositories for silentpulse
Users that are interested in silentpulse are comparing it to the libraries listed below
Sorting:
- ☆16Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- Unix Process hollowing in rust☆22Updated 7 months ago
- Tool for obtaining information about PPL processes☆17Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 2 weeks ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Cobalt Strike notifications via NTFY.☆14Updated 10 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated last year
- string encryption in Nim☆20Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated 2 years ago
- A simple to use single-include Windows API resolver☆22Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- An In-memory Embedding of CPython☆29Updated 4 years ago
- ☆19Updated 3 months ago
- Command and Control Framework using powershell implants☆35Updated last month
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆21Updated 5 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆23Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Simple reverse ICMP shell☆14Updated last year
- Python3 tool to perform password spraying using RDP☆17Updated last year
- Repository to gather the BOF files I will be developing☆10Updated 10 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Updated last year