DefCon Red Team Village 2023 Workshop on DLL Sideloading
☆19Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for RedTeamVillage2023-DLL-Sideloading
Users that are interested in RedTeamVillage2023-DLL-Sideloading are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆26Jun 2, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆148May 6, 2023Updated 2 years ago
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 7 years ago
- A collection of PoCs for different injection techniques on Windows!☆50Aug 27, 2023Updated 2 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 9 months ago
- ☆12Jun 27, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Updated this week
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Feb 13, 2023Updated 3 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 8 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Libhide is an iphone icon hiding library to hide icons from springboard using mobile substrate.☆19Oct 13, 2011Updated 14 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆63Jul 15, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- An HTTP server to easily download and upload files.☆23Aug 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"☆16Sep 17, 2022Updated 3 years ago
- Tool for WPA Enterprise hacking☆17Feb 24, 2024Updated 2 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- ☆18Dec 23, 2024Updated last year
- PowerShell script to generate "proxy" counterparts to easily perform DLL Sideloading☆130Jul 24, 2019Updated 6 years ago
- iOS dylib build support in Xcode☆22Nov 7, 2011Updated 14 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 6 years ago