tyranid / windows-security-internalsLinks
A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.
☆219Updated 5 months ago
Alternatives and similar repositories for windows-security-internals
Users that are interested in windows-security-internals are comparing it to the libraries listed below
Sorting:
- ☆333Updated 4 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Updated 2 years ago
- ☆334Updated 5 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- ☆301Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Updated 6 months ago
- Tools for analyzing EDR agents☆277Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆423Updated 11 months ago
- RunPE implementation with multiple evasive techniques (1)☆381Updated 2 years ago
- A PowerShell console in C/C++ with all the security features disabled☆341Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆169Updated last year
- Open Source C&C Specification☆278Updated 11 months ago
- Collect Windows telemetry for Maldev☆455Updated last week
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆408Updated 3 weeks ago
- Windows protocol library, including SMB and RPC implementations, among others.☆609Updated 2 weeks ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 3 months ago
- ☆105Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆426Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- ☆164Updated 11 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆112Updated 2 months ago
- Simulate the behavior of AV/EDR for malware development training.☆562Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆419Updated 4 months ago
- Proof of concept & details for CVE-2025-21298☆195Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆368Updated last week
- ☆179Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Updated 3 years ago
- A tool to transform Chromium browsers into a C2 Implant☆542Updated last month
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆331Updated this week