m0n1x90 / vettaiyanLinks
Developing an open source Windows EDR written in C & C++ & C#
☆25Updated 6 months ago
Alternatives and similar repositories for vettaiyan
Users that are interested in vettaiyan are comparing it to the libraries listed below
Sorting:
- A small red team course☆40Updated 2 years ago
- ☆59Updated last year
- ☆58Updated 6 months ago
- Windows Administrator level Implant.☆50Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆34Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 5 months ago
- Permanently disable EDRs as local admin☆124Updated last month
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆54Updated last year
- ☆36Updated 2 years ago
- Explore and filter your GitHub starred repositories☆25Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- Payload Generation Workflow☆40Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated 3 weeks ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆73Updated 10 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated 4 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆88Updated 6 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- ☆43Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago