yoda66 / MalwareDevTalkLinks
☆48Updated 5 years ago
Alternatives and similar repositories for MalwareDevTalk
Users that are interested in MalwareDevTalk are comparing it to the libraries listed below
Sorting:
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Change up a binary's embedded resources with this little creature.☆34Updated 5 years ago
- ☆46Updated 3 years ago
- ☆20Updated 5 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆95Updated 2 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- terraform deployment for red team☆22Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- ☆41Updated 6 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- ☆38Updated last year
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆36Updated 3 years ago
- ☆58Updated 3 years ago