Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
  
  PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
GitHub
  
  GitHub - Idov31/Cronos: PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
  PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. - Idov31/Cronos
👍2
  Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
  
  Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
GitHub
  
  GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
  Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
👍4🕊3
  CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
  
  This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
GitHub
  
  GitHub - matro7sh/BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
  This map lists the essential techniques to bypass anti-virus and EDR - matro7sh/BypassAV
👍2
  wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
  
  UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
GitHub
  
  GitHub - wh0amitz/KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets
  UAC Bypass By Abusing Kerberos Tickets. Contribute to wh0amitz/KRBUACBypass development by creating an account on GitHub.
👍3
  BlackSnufkin/NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
  
  Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
GitHub
  
  GitHub - BlackSnufkin/NovaLdr: Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party…
  Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre) - BlackSnufkin/NovaLdr
👍2
  Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
  
  Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
GitHub
  
  GitHub - Krypteria/AtlasLdr: Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
  Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls - Krypteria/AtlasLdr
  xaitax/CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
  
  CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
GitHub
  
  GitHub - xaitax/CVE-2024-6387_Check: CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running…
  CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH - xaitax/CVE-2024-6387_Check
  safedv/RustiveDump
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
  
  LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
GitHub
  
  GitHub - safedv/RustiveDump: LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode…
  LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission. - safedv/RustiveDump
  ricardojoserf/NativeBypassCredGuard
Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
Language: C#
#credential_guard #ntapi #ntdll_unhooking #redteam_tools #wdigest
Stars: 166 Issues: 0 Forks: 19
https://github.com/ricardojoserf/NativeBypassCredGuard
  
  Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
Language: C#
#credential_guard #ntapi #ntdll_unhooking #redteam_tools #wdigest
Stars: 166 Issues: 0 Forks: 19
https://github.com/ricardojoserf/NativeBypassCredGuard
GitHub
  
  GitHub - ricardojoserf/NativeBypassCredGuard: Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
  Bypass Credential Guard by patching WDigest.dll using only NTAPI functions - ricardojoserf/NativeBypassCredGuard
❤1
  BlackSnufkin/LitterBox
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Language: YARA
#malware_development #redteam #sandbox
Stars: 168 Issues: 0 Forks: 14
https://github.com/BlackSnufkin/LitterBox
  
  sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Language: YARA
#malware_development #redteam #sandbox
Stars: 168 Issues: 0 Forks: 14
https://github.com/BlackSnufkin/LitterBox
GitHub
  
  GitHub - BlackSnufkin/LitterBox: A secure sandbox environment for malware developers and red teamers to test payloads against detection…
  A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil...
👍4
  Print3M/DllShimmer
Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Language: Go
#backdoor #dll_hijacking #dll_sideloading #golang #initial_access #malware #pentesting #persistence #redteam #security #security_tools #windows #windows_security
Stars: 303 Issues: 0 Forks: 41
https://github.com/Print3M/DllShimmer
  
  Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Language: Go
#backdoor #dll_hijacking #dll_sideloading #golang #initial_access #malware #pentesting #persistence #redteam #security #security_tools #windows #windows_security
Stars: 303 Issues: 0 Forks: 41
https://github.com/Print3M/DllShimmer
GitHub
  
  GitHub - Print3M/DllShimmer: Weaponize DLL hijacking easily. Backdoor any function in any DLL.
  Weaponize DLL hijacking easily. Backdoor any function in any DLL. - Print3M/DllShimmer
  