Lists (1)
Sort Name ascending (A-Z)
Stars
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
This project aims to compare and evaluate the telemetry of various EDR products.
KslDump — Why bring your own knife when Defender already left one in the kitchen?
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
VolatilityBot – An automated memory analyzer for malware samples and memory dumps
A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.
Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
Static analysis & exploitation-triage toolkit for Windows kernel drivers. Discover IOCTLs, Symbolic Links, and check cert , and Downlaods BYOVD
A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from system .