Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dockerfile
- F#
- FreeMarker
- Go
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- LLVM
- Logos
- Makefile
- Nim
- PHP
- Pascal
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Verilog
- Visual Basic
- Vue
- XSLT
- YARA
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
darktable is an open source photography workflow application and raw developer
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
Collection of PoC and offensive techniques used by the BlackArrow Red Team
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Demos of various injection techniques found in malware
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Windows 10 UAC bypass for all executable files which are autoelevate true .
Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House
BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.
Exercises for learning Reverse Engineering and Exploitation.
Some ways to inject a DLL into a alive process