xalicex / blackhoodie_maldev101_2022Links
☆25Updated 2 years ago
Alternatives and similar repositories for blackhoodie_maldev101_2022
Users that are interested in blackhoodie_maldev101_2022 are comparing it to the libraries listed below
Sorting:
- ☆27Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆22Updated last year
- ☆23Updated 3 years ago
- ☆31Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆12Updated 3 years ago
- ☆23Updated last year
- ☆10Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- AMSI detection PoC☆32Updated 5 years ago
- ☆48Updated last year
- Presentaciones de congresos☆53Updated last year
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago