Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
GitHub
GitHub - Idov31/Cronos: PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. - Idov31/Cronos
👍2
Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
GitHub
GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
👍4🕊3
wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
GitHub
GitHub - wh0amitz/KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets
UAC Bypass By Abusing Kerberos Tickets. Contribute to wh0amitz/KRBUACBypass development by creating an account on GitHub.
👍3
fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
#agents #cybersecurity #infosec #llm
Stars: 404 Issues: 1 Forks: 33
https://github.com/fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
#agents #cybersecurity #infosec #llm
Stars: 404 Issues: 1 Forks: 33
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
GitHub
GitHub - DosX-dev/Astral-PE: Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64) - DosX-dev/Astral-PE
👍1