A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
-
Updated
Apr 3, 2026 - C#
A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.
C# .NET 9 Blazor Server cybersecurity simulation dashboard. Modular adversary emulation framework with live threat intel (AlienVault OTX, AbuseIPDB), MITRE ATT&CK mapping, and real-time SignalR events. Showcases OOP, clean architecture, EF Core, Repository, Factory, and Template Method patterns.
Compiled .NET 8 PowerShell deobfuscation sandbox — hosts the PS engine to intercept malware execution
🏰 AI-powered Windows security monitoring with conversational AI chat for natural language threat hunting. Features human-in-the-loop actions, YARA malware detection, MITRE ATT&CK mapping, vector search & threat intelligence. React dashboard with real-time updates. 12K+ events/sec. .NET 8, Ollama/OpenAI, Qdrant.
Test Blue Team detections without running any attack.
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
A forked version of Atomic YAML instructions and technique dependencies used by ARTiC2 controllers to construct and execute red team atomic test cases from memory
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."