Starred repositories
The fastest path to AI-powered full stack observability, even for lean teams.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Small and highly portable detection tests based on MITRE's ATT&CK.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
A repository for learning various heap exploitation techniques.
A Linux version of the ProcDump Sysinternals tool
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
A post exploitation framework designed to operate covertly on heavily monitored environments
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
A memory-based evasion technique which makes shellcode invisible from process start to end.
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …
An in depth tutorial on how to do binary exploitation
Dump various types of Windows credentials without injecting in any process.
Some demos to bypass EDRs or AVs by 78itsT3@m
A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process