-
Slándail Research Limited
- Dublin, Ireland
- https://xn--slndil-qtac.ie/
- @ciaranmak@mastodon.ie
Highlights
- Pro
Stars
A repository for learning various heap exploitation techniques.
Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
A post exploitation framework designed to operate covertly on heavily monitored environments
tiny, portable SOCKS5 server with very moderate resource usage
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Research code & papers from members of vx-underground.
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
Remote operations commands implemented using Beacon Object Files
A root exploit for CVE-2022-0847 (Dirty Pipe)
fast, standalone, language-agnostic WebSocket server RFC6455 compliant
The research UEFI hypervisor that supports booting an operating system.
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
WireGuard Obfuscator - simple obfuscator for WireGuard. Useful if your ISP/government blocks WireGuard traffic.
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
Exploiting DLL Hijacking by DLL Proxying Super Easily
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
Encrypted shellcode Injection to avoid Kernel triggered memory scans
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability