Starred repositories
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A post exploitation framework designed to operate covertly on heavily monitored environments
Situational Awareness commands implemented using Beacon Object Files
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecur…
Cobalt Strike Aggressor 插件包
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Quickly debug shellcode extracted during malware analysis
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Exploiting DLL Hijacking by DLL Proxying Super Easily
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…
Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…
A shellcode function to encrypt a running process image when sleeping.
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File
Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.
Reflective DLL loading of your favorite Golang program
Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
A simple tool to convert the IP to a DWORD IP