yoda66 / MalwareDevTalkLinks
☆48Updated 5 years ago
Alternatives and similar repositories for MalwareDevTalk
Users that are interested in MalwareDevTalk are comparing it to the libraries listed below
Sorting:
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Simple .NET assembly to interact with services.☆41Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- ☆46Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆76Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- ☆95Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆36Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- ☆53Updated 4 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- ☆52Updated 3 years ago
- ☆25Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated last week
- ☆41Updated 6 years ago