Darktortue's Stars
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
JustasMasiulis/lazy_importer
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
Mr-Un1k0d3r/SCShell
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
dchrastil/ScrapedIn
A tool to scrape LinkedIn without API restrictions for data reconnaissance
Xacone/BestEdrOfTheMarket
Little user-mode AV/EDR evasion lab for training & learning purposes
SafeBreach-Labs/PoolParty
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
es3n1n/obfuscator
PE bin2bin obfuscator
Cracked5pider/LdrLibraryEx
A small x64 library to load dll's into memory.
vxlang/vxlang-page
protector & obfuscator & code virtualizer
MaorSabag/TrueSightKiller
CPP AV/EDR Killer
TheD1rkMtr/TakeMyRDP
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Prepouce/CoercedPotato
A Windows potato to privesc
S3cur3Th1sSh1t/Caro-Kann
Encrypted shellcode Injection to avoid Kernel triggered memory scans
Mr-Un1k0d3r/.NetConfigLoader
.net config loader
KingOfTheNOPs/cookie-monster
BOF to steal browser cookies & credentials
hackerhouse-opensource/OffensiveLua
Offensive Lua.
nettitude/Tartarus-TpAllocInject
ph4nt0mbyt3/Darkside
C# AV/EDR Killer using less-known driver (BYOVD)
cpu0x00/SharpReflectivePEInjection
reflectively load and execute PEs locally and remotely bypassing EDR hooks
naksyn/ProcessStomping
A variation of ProcessOverwriting to execute shellcode on an executable's section
HuskyHacks/SharpTokenFinder
C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps
zimnyaa/noWatch
Implant drop-in for EDR testing
Z4kSec/IoctlHunter
IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.
Speedi13/Custom-GetProcAddress-and-GetModuleHandle-and-more
Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions
Allevon412/BreadManModuleStomping
Sh0ckFR/API-Hashing
A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++
Hagrid29/CertifyKit
Active Directory certificate abuse
p4p1/havoc-store
A simple website to act as a store for havoc modules and extensions
wh0amitz/CTFCON2023-POC