Stars
A launch point for your personal nvim configuration
A minimal OS implemented following "Operating system in 1000 lines of code"
Some scripts to abuse kerberos using Powershell
Arsenal is just a quick inventory and launcher for hacking programs
Shadow is a discrete-event network simulator that directly executes real application code, enabling you to simulate distributed systems with thousands of network-connected processes in realistic an…
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.
PoC Implementation of a fully dynamic call stack spoofer
Hide memory artifacts using ROP and hardware breakpoints.
Fast and lightweight x86/x86-64 disassembler and code generation library
A modern 32/64-bit position independent implant template
Collection of resources for my preparation to take the OSEE certification.
Awesome list of open-source startup alternatives to well-known SaaS products 🚀
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…
Load and execute COFF files and Cobalt Strike BOFs in-memory
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
An awesome & curated list of binary rewriting papers
Search and browse documents and data; find the people and companies you look for.
Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!
This repo covers some code execution and AV Evasion methods for Macros in Office documents
Collection of malware source code for a variety of platforms in an array of different programming languages.
Template-Driven AV/EDR Evasion Framework
metame is a metamorphic code engine for arbitrary executables
Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting…