Lists (4)
Sort Name ascending (A-Z)
Stars
Elastic Security detection content for Endpoint
Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack, implemented in C#, C++, Crystal, Python and Rust
Windows App for creating apps to quickly set up Splunk Infrastructure
The TA for Security Onion allows your splunk to parse Zeek and Suricata data, and map it into the Common Information Model.
A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use in testing detection techniques or other security research.
List the ETW provider(s) in the registration table of a process.
coffeegist / bofhound
Forked from fortalice/bofhoundGenerate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by surgically patching SeCiCallbacks via native subsystem. Inclu…
Simulate the behavior of AV/EDR for malware development training.
Arsenal is just a quick inventory and launcher for hacking programs
pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers
Patchless AMSI bypass using hardware breakpoints and a vectored exception handler to intercept AmsiScanBuffer and AmsiScanString before they execute. The bypass reads the 5th parameter (the AMSI re…
Educational PowerShell-based shellcode injection library.
Cobalt-Strike / unhook-bof
Forked from rsmudge/unhook-bofRemove API hooks from a Beacon process.
UDC2 implementation that provides an ICMP C2 channel
Collection of Beacon Object Files (BOF) for Cobalt Strike
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
BOF for Kerberos abuse (an implementation of some important features of the Rubeus).
A collection of (mostly) technical things every software developer should know about