Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL privilege
☆75Jan 19, 2026Updated 3 months ago
Alternatives and similar repositories for ThreatIntelligenceConsumer
Users that are interested in ThreatIntelligenceConsumer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- Linux Process Injection via Seccomp Notifier☆95Dec 9, 2025Updated 4 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆125Mar 27, 2026Updated last month
- Finding Truth in the Shadows☆127Jan 26, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- WinDbg-ext-MCP bridges your favorite LLM client (like Cursor, Claude, or VS Code) with WinDbg, enabling real-time, AI assisted kernel deb…☆100Sep 10, 2025Updated 7 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆160Mar 26, 2025Updated last year
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆71May 2, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆27Mar 6, 2025Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆167May 28, 2025Updated 11 months ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Usermode exploit to bypass any AC using a 0day shatter attack.☆275Nov 26, 2025Updated 5 months ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆268Oct 16, 2024Updated last year
- BOF to run PE in Cobalt Strike Beacon without console creation☆199Nov 23, 2025Updated 5 months ago
- ☆23Mar 6, 2023Updated 3 years ago
- ☆61Oct 24, 2025Updated 6 months ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆44Jan 18, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆54Nov 9, 2025Updated 5 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆108Feb 25, 2025Updated last year
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆45Dec 19, 2025Updated 4 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆466Mar 7, 2026Updated last month
- Sleep Obfuscation☆46Oct 13, 2022Updated 3 years ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆204Aug 2, 2023Updated 2 years ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- Call stack spoofing for Rust☆365Feb 7, 2025Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Ascii85 encoder/decoder written in C with no memory allocation, no whitespace tolerance.☆11Jun 24, 2020Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆45Sep 6, 2021Updated 4 years ago
- Shellcode loader that executes embedded Lua from Rust.☆125Dec 16, 2024Updated last year