lsecqt / OffensiveCpp
This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
☆686Updated last month
Alternatives and similar repositories for OffensiveCpp:
Users that are interested in OffensiveCpp are comparing it to the libraries listed below
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆653Updated last year
- ☆342Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,172Updated last year
- My collection of malware dev links☆260Updated 6 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆631Updated 7 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆655Updated last week
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆956Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆791Updated 8 months ago
- Analyse your malware to surgically obfuscate it☆456Updated 3 weeks ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆307Updated 7 months ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆531Updated 8 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆690Updated 10 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,214Updated last month
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆368Updated 10 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆368Updated 5 months ago
- A modern 32/64-bit position independent implant template☆1,168Updated this week
- Protected Process Dumper Tool☆533Updated last year
- Because AV evasion should be easy.☆676Updated 3 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,119Updated last month
- Win32 and Kernel abusing techniques for pentesters☆945Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆488Updated 2 years ago
- Performing Indirect Clean Syscalls☆521Updated last year
- PoCs and tools for investigation of Windows process execution techniques☆912Updated last week
- ☆703Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆514Updated last year
- ☆184Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆840Updated 2 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆512Updated 9 months ago