tanc7 / skidstormView external linksLinks
☆25Mar 19, 2025Updated 10 months ago
Alternatives and similar repositories for skidstorm
Users that are interested in skidstorm are comparing it to the libraries listed below
Sorting:
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- ☆17Feb 15, 2022Updated 3 years ago
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Yaras Random☆23Feb 21, 2019Updated 6 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 9 months ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 5 months ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- We found a way to DLL sideload with cleanmgr.exe☆96Feb 25, 2025Updated 11 months ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Sep 4, 2023Updated 2 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Apr 22, 2019Updated 6 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated 3 weeks ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated last month
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 7 months ago
- Go library to parse Executable and Linkable Format (ELF) files.☆52Jun 27, 2024Updated last year
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Example of an ELF parser to learn about the ELF format☆10Oct 6, 2024Updated last year