Lists (32)
Sort Name ascending (A-Z)
Automation
Automotive
Projects related to automotiveAzure
Blue team
Threat intelligence, security monitoring, SIEM, EDRC2
Cloud
Cloud audit tools, pentest toolsCoding
Containers
Containers, orchestration, KubernetesCTI
CVE
Dorks
fuzzing
Hardware
Linux
Lists
Malware development
Courses, tools for evaison, bulding malware, etc.MCP
Misc
Crypto and other random stuffML/AI
Mobile
Networking
OSINT
Phishing
Purple team
Reconnaissance
Reconnaissance, OSINTRed team
Reporting
Source code analysis
Training
Web
Wifi
Windows
Stars
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
A modern 32/64-bit position independent implant template
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
A memory-based evasion technique which makes shellcode invisible from process start to end.
Collection of PoC and offensive techniques used by the BlackArrow Red Team
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
The Open-Smartwatch Operating System.
AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
Complete list of LPE exploits for Windows (starting from 2023)
MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
A collection of my Semgrep rules to facilitate vulnerability research.
some gadgets about windows process and ready to use :)
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Collection of UAC Bypass Techniques Weaponized as BOFs
HookChain: A new perspective for Bypassing EDR Solutions