Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
GitHub
GitHub - Idov31/Cronos: PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. - Idov31/Cronos
Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
GitHub
GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
GitHub
GitHub - matro7sh/BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
This map lists the essential techniques to bypass anti-virus and EDR - matro7sh/BypassAV
wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
GitHub
GitHub - wh0amitz/KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets
UAC Bypass By Abusing Kerberos Tickets. Contribute to wh0amitz/KRBUACBypass development by creating an account on GitHub.
BlackSnufkin/NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
GitHub
GitHub - BlackSnufkin/NovaLdr: Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party…
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre) - BlackSnufkin/NovaLdr
Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
GitHub
GitHub - Krypteria/AtlasLdr: Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls - Krypteria/AtlasLdr
xaitax/CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
GitHub
GitHub - xaitax/CVE-2024-6387_Check: CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running…
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH - xaitax/CVE-2024-6387_Check
safedv/RustiveDump
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
GitHub
GitHub - safedv/RustiveDump: LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and…
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption,...