szircj / hyde2Links
Una interfaz para Jekyll que analiza fuentes C++ para producir y aplicar documentación fuera de línea.
☆11Updated 10 months ago
Alternatives and similar repositories for hyde2
Users that are interested in hyde2 are comparing it to the libraries listed below
Sorting:
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ☆10Updated 3 years ago
- ☆11Updated 3 years ago
- Malware Development Framework☆10Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆9Updated 2 months ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- ☆12Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- ☆18Updated 7 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- ☆17Updated 6 years ago
- ☆12Updated 5 years ago
- ☆15Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 4 months ago
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 7 months ago