xalicex / blackhoodie_maldev101_2022
☆25Updated 2 years ago
Alternatives and similar repositories for blackhoodie_maldev101_2022:
Users that are interested in blackhoodie_maldev101_2022 are comparing it to the libraries listed below
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ☆12Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆22Updated 8 months ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- ☆30Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆26Updated 3 years ago
- ☆23Updated 2 years ago
- A simple to use single-include Windows API resolver☆19Updated 7 months ago
- ☆10Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆36Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆34Updated 5 months ago
- ☆25Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- ☆24Updated 3 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- AMSI detection PoC☆31Updated 4 years ago