Lifka's Stars
microsoft/MS-DOS
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
dotnet/runtime
.NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps.
lucasg/Dependencies
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
HackTricks-wiki/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
microsoft/Windows-driver-samples
This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.
es3n1n/no-defender
A slightly more fun way to disable windows defender + firewall. (through the WSC api)
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
Air14/HyperHide
Hypervisor based anti anti debug plugin for x64dbg
microsoft/krabsetw
KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.
strivexjun/DriverInjectDll
Using Driver Global Injection dll, it can hide DLL modules
redteamsocietegenerale/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
darkoperator/Posh-SecMod
PowerShell Module with Security cmdlets for security work
pathtofile/Sealighter
Sysmon-Like research tool for ETW
0xda568/IconJector
Unorthodox and stealthy way to inject a DLL into the explorer using icons
sicaril/BaymaxTools
BaymaxTools is a feature code extraction and search plug-in for x64dbg debugger. it is convenient to extract the signature of the specified instruction and the number of occurrences of the signature in the search module.
ionescu007/HookingNirvana
Recon 2015 Presentation from Alex Ionescu
jsecurity101/TelemetrySource
repnz/etw-providers-docs
Document ETW providers
zhuhuibeishadiao/ntoskrnl
The Windows Research Kernel (WRK)
secrary/Hooking-via-InstrumentationCallback
codes for my blog post: https://secrary.com/Random/InstrumentationCallback/
jsecurity101/ETWInspector
pathtofile/PPLRunner
Run Processes as PPL with ELAM
0xeb/WinTools
A collection of free miscellaneous Windows tools
zodiacon/sysrun
Run any executable as SYSTEM account (no service required)
Chainski/ForceAdmin
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
not-wlan/instrumentation-callbacks
based on https://github.com/secrary/Hooking-via-InstrumentationCallback
zacbrown/hiddentreasure-etw-demo
Basic demo for Hidden Treasure talk.
hasherezade/shellc_encoder
Standalone Metasploit-like XOR encoder for shellcode
arsium/PEPatcher
A PE information patcher.
VirusTotal/gti-use-cases