0xEva's Stars
naim94a/lumen
A private Lumina server for IDA Pro
WPeace-HcH/WPeChatGPT
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
izenynn/c-reverse-shell
A reverse shell for Windows and Linux written in C.
Ridter/Intranet_Penetration_Tips
2018年初整理的一些内网渗透TIPS,后面更新的慢,所以整理出来希望跟小伙伴们一起更新维护~
TheWover/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
chztbby/RebirthGuard
Anti-cheat library for Windows C++
EgeBalci/sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
klezVirus/SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
matterpreter/DefenderCheck
Identifies the bytes that Microsoft Defender flags on.
rasta-mouse/ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
MrEmpy/Reaper
「💀」Proof of concept on BYOVD attack
MmMapIoSpace/UCMapper
Unknowncheats Magically Optimized Tidy Mapper using nvaudio
shr3ddersec/Shr3dKit
Red Team Tool Kit
zzzteph/weakpass
Weakpass collection of tools for bruteforce and hashcracking
ignis-sec/Pwdb-Public
A collection of all the data i could extract from 1 billion leaked credentials from internet.
ohmybahgosh/RockYou2021.txt
RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists. RockYou2021.txt DOES NOT CONTAIN USER:PASS logins!
wwl012345/PasswordDic
渗透测试常用密码字典合集(持续更新)
bluscreenofjeff/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
ajkhoury/UEFI-Bootkit
A small bootkit which does not rely on x64 assembly.
Mattiwatti/EfiGuard
Disable PatchGuard and Driver Signature Enforcement at boot time
sa413x/UEFI-Bootloader
Simple mmapper which using UEFI runtime driver.
hfiref0x/UACME
Defeating Windows User Account Control
mttaggart/wtfbins
WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
deepinstinct/Dirty-Vanity
A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
Cracked5pider/LdrLibraryEx
A small x64 library to load dll's into memory.
Octoberfest7/Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
mgeeky/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
Apxaey/Handle-Hijacking-Anti-Cheat-Bypass
This is a Anti-Cheat bypass written in c++ by Apxaey, and makes use of Microsoft's undocumented Native API. I tested this specifically on VAC, however it should bypass any other usermode anticheats. This is by no means a complete 'bypass'; rather it should be used in conjunction with other bypass techniques. Using this with unique code, should ensure you stay undetected by user-mode anti-cheats such as VAC.. I have provided a YouTube tutorial on how to make this software which i highly recommend you watch. If you like my stuff, feel free to join my discord server https://discord.gg/GVyENvk
gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
lucasg/Dependencies
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.