Cliov's Stars
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
moonD4rk/HackBrowserData
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
shadow1ng/fscan
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。
BlackINT3/OpenArk
The Next Generation of Anti-Rookit(ARK) tool for Windows.
gwuhaolin/lightsocks
⚡️一个轻巧的网络混淆代理🌏
GhostPack/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
ufrisk/MemProcFS
MemProcFS
optiv/ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
gloxec/CrossC2
generate CobaltStrike's cross-platform payload
knownsec/shellcodeloader
shellcodeloader
Adminisme/ServerScan
ServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
jthuraisamy/SysWhispers2
AV/EDR evasion via direct system calls.
fofapro/fapro
Fake Protocol Server
CCob/SharpBlock
A method of bypassing EDR's active projection DLL's by preventing entry point exection
NtQuery/Scylla
Imports Reconstructor
adamyaxley/Obfuscate
Guaranteed compile-time string literal obfuscation header-only library for C++14
bitterzzZZ/MemoryShellLearn
分享几个直接可用的内存马,记录一下学习过程中看过的文章
cribdragg3r/Alaris
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
bats3c/ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
josephkingstone/cobalt_strike_extension_kit
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Cr4sh/MicroBackdoor
Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
er10yi/MagiCude
分布式端口(漏洞)扫描、资产安全管理、实时威胁监控与通知、高效漏洞闭环、漏洞wiki、邮件报告通知、poc框架
huoji120/Antivirus_R3_bypass_demo
分别用R3的0day与R0的0day来干掉杀毒软件
mai1zhi2/SysWhispers2_x86
X86 version of syswhispers2 / x86 direct system call
S1ckB0y1337/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
LloydLabs/Windows-API-Hashing
This is a simple example and explanation of obfuscating API resolution via hashing
thunderbarca/Caesar
一个全新的敏感文件发现工具
0x727/MetasploitCoop_0x727
基于msf的后渗透协作平台
mdsecactivebreach/firewalker
Rvn0xsy/PDacl
Play Doh Windows ACL Tools