m0n1x90 / vettaiyanLinks
Developing an open source Windows EDR written in C & C++ & C#
☆25Updated 3 months ago
Alternatives and similar repositories for vettaiyan
Users that are interested in vettaiyan are comparing it to the libraries listed below
Sorting:
- A small red team course☆39Updated 2 years ago
- ☆47Updated 3 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆59Updated 10 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Permanently disable EDRs as local admin☆116Updated 3 months ago
- Situational Awareness script to identify how and where to run implants☆65Updated 10 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 weeks ago
- IAT Unhooking proof-of-concept☆30Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆85Updated 2 months ago
- vulnlab.com reaper writeup☆26Updated 2 years ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆87Updated 2 months ago
- Windows Administrator level Implant.☆49Updated last year
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- ☆36Updated last year
- ☆158Updated 3 months ago
- ☆82Updated 10 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 6 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆70Updated last month
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆78Updated 2 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- ☆39Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- ☆84Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year