Stars
An even funnier way to disable windows defender. (through WSC api)
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
A simple keylogger for Windows, Linux and Mac
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Win32 and Kernel abusing techniques for pentesters
Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.
dll injection tool that implements various methods
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
Tools for interacting with authentication packages using their individual message protocols
Custom Metasploit post module to executing a .NET Assembly from Meterpreter session
A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.
Leaked source code of the babuk ransomware by VXUG
This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.
Leak of any user's NetNTLM hash. Fixed in KB5040434