Starred repositories
Share a single keyboard and mouse between multiple computers.
An even funnier way to disable windows defender. (through WSC api)
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
miniz: Single C source file zlib-replacement library, originally from code.google.com/p/miniz
Disable PatchGuard and Driver Signature Enforcement at boot time
Nidhogg is an all-in-one simple to use windows kernel rootkit.
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Alternative Shellcode Execution Via Callbacks
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
The BEST DLL Injector Library.
Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThreadNotifyRoutine Callback、PsSetLoadImageNotifyRoutine Callback...
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
vadimgrn / usbip-win2
Forked from cezanne/usbip-winUSB/IP Client for Windows
RpcView is a free tool to explore and decompile Microsoft RPC interfaces
Win32 and Kernel abusing techniques for pentesters
Another Windows Local Privilege Escalation from Service Account to System
PoC Implementation of a fully dynamic call stack spoofer
Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
Obfusheader.h is a portable header file for C++14 compile-time obfuscation.
Enumerate and disable common sources of telemetry used by AV/EDR.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.