netspooky / kimagure
☆44Updated 3 years ago
Alternatives and similar repositories for kimagure:
Users that are interested in kimagure are comparing it to the libraries listed below
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- QuoteDB (Vulnerable TCP Server)☆64Updated last year
- Dump stuff without touching disk☆162Updated 4 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Windbg Readable & Dark Green Theme - Own Use☆44Updated 5 years ago
- A repo to support the book☆106Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- ☆111Updated last year
- Bypassing AppLocker with C#☆138Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- My thoughts from going through the OSEP materials.☆21Updated 4 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- ☆96Updated 5 months ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆122Updated 3 years ago
- Bring your own print driver privilege escalation tool☆248Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- ☆121Updated last year
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- ☆68Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Posts about different topics☆36Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago