You play God
☆28Jun 4, 2025Updated 9 months ago
Alternatives and similar repositories for Ecosystem
Users that are interested in Ecosystem are comparing it to the libraries listed below
Sorting:
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated last month
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- Repository for slide decks of public talks I've given.☆14Apr 23, 2023Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 4 months ago
- ☆22Jul 10, 2020Updated 5 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- ☆23Apr 28, 2024Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- A driver loader for Windows NT using NtLoadDriver()☆24Aug 30, 2015Updated 10 years ago
- Convert VBS file to EXE☆17May 17, 2025Updated 9 months ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- ☆25Dec 16, 2024Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 2 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- ☆20Dec 11, 2017Updated 8 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 5 months ago