preludeorg / ThreatIntelligenceConsumerLinks
Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL privilege
☆42Updated this week
Alternatives and similar repositories for ThreatIntelligenceConsumer
Users that are interested in ThreatIntelligenceConsumer are comparing it to the libraries listed below
Sorting:
- Beacon Debugger☆55Updated last year
- ☆60Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25Updated last year
- Linux Process Injection via Seccomp Notifier☆81Updated last month
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Updated 2 years ago
- ☆57Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- x64 version☆36Updated 4 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- ☆57Updated 2 years ago
- ☆62Updated 3 years ago
- BYOVD collection☆24Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- A cmake template for crystal palace☆38Updated last month
- Repo that holds random POCs☆52Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Updated 3 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Load a dynamic library from memory using a fuse mount☆31Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 6 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆53Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Updated 2 years ago
- ☆33Updated 11 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- ☆50Updated 3 years ago
- UDC2 implementation that provides an ICMP C2 channel☆113Updated last month