paranoidninja / BRC4-Seminar-Stage-ILinks
These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be found here:
☆20Updated last year
Alternatives and similar repositories for BRC4-Seminar-Stage-I
Users that are interested in BRC4-Seminar-Stage-I are comparing it to the libraries listed below
Sorting:
- ☆48Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Bunch of BOF files☆33Updated last week
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- A care package of useful bofs for red team engagments☆55Updated 7 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 5 months ago
- ☆59Updated last year
- ☆48Updated 2 years ago
- A pure C version of SymProcAddress☆27Updated last year
- Rewrite to fit my needs☆28Updated 11 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆31Updated this week
- BOF for C2 framework☆41Updated 7 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- ☆43Updated last year
- miscellaneous codes☆36Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆34Updated 2 months ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year