Lists (1)
Sort Name ascending (A-Z)
Stars
This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.
A Terpene Profiler App With Database suggestions , and Social Reviews . ©️ Michael Paulino August 9 2025 in Haverhill Massachusetts.
List or #ontology of Data site for doing on Apple iOS #siliconvalley #coding #data #apex2025 #mi6paulino
Metaverse gallery https://voxels.com/play?coords=NW@671W,8S @mrveryviral on insta
Remote Key Logger and ReverseShell
Simple C++ Reverse Shell with WinSockets
A collection of tools, scripts and personal research
The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.
Event Tracing For Windows (ETW) Resources
A toolset to make a system look as if it was the victim of an APT attack
YARA signature and IOC database for my scanners and tools
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls, Event Tracing for Windows (ETW) suppression, process hollo…
This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions
payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…
CryptozombiesHQ / scrypt-js
Forked from ricmoo/scrypt-jsPure JavaScript implementation of the scrypt password-based key derivation function.
The excellent tape-run ported as Webpack plugin