Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2
☆19Oct 8, 2020Updated 5 years ago
Alternatives and similar repositories for 0xdarkvortex-red-team-ttps-part-2
Users that are interested in 0xdarkvortex-red-team-ttps-part-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- My CobaltStrike BOFS☆167Jul 23, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- ☆61Oct 24, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 7 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- ☆57Jan 15, 2024Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- ☆37May 9, 2019Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Jul 21, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- ☆13Jan 21, 2019Updated 7 years ago
- 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。☆13Sep 25, 2020Updated 5 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆115Aug 29, 2022Updated 3 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆129Apr 24, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Oct 28, 2021Updated 4 years ago
- ☆98Dec 9, 2021Updated 4 years ago