szircj / hyde2
Una interfaz para Jekyll que analiza fuentes C++ para producir y aplicar documentación fuera de línea.
☆11Updated 7 months ago
Alternatives and similar repositories for hyde2:
Users that are interested in hyde2 are comparing it to the libraries listed below
- Malware Development Framework☆10Updated 11 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- ☆12Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- ☆15Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Nice try reading NTDLL from disk, nerd.☆18Updated 2 years ago
- ☆11Updated 3 years ago
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- Python C2 with JScript Implant☆14Updated last year
- ☆15Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 8 months ago