paranoidninja / 0xdarkvortex-red-team-ttps-part-2View external linksLinks
Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2
☆19Oct 8, 2020Updated 5 years ago
Alternatives and similar repositories for 0xdarkvortex-red-team-ttps-part-2
Users that are interested in 0xdarkvortex-red-team-ttps-part-2 are comparing it to the libraries listed below
Sorting:
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- ☆61Oct 24, 2025Updated 3 months ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- My CobaltStrike BOFS☆166Jul 23, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。☆13Sep 25, 2020Updated 5 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆34Jul 8, 2025Updated 7 months ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14May 26, 2019Updated 6 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- ☆23Jul 3, 2020Updated 5 years ago
- ☆98Dec 9, 2021Updated 4 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆113Aug 29, 2022Updated 3 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Apr 11, 2022Updated 3 years ago
- ☆37May 9, 2019Updated 6 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Apr 24, 2022Updated 3 years ago