RonGatenio's Stars
reactos/reactos
A free Windows-compatible Operating System
davidteather/TikTok-Api
The Unofficial TikTok API Wrapper In Python
red-data-tools/YouPlot
A command line tool that draw plots on the terminal.
Ascotbe/Kernelhub
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
SinaKarvandi/Hypervisor-From-Scratch
Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials
googleprojectzero/sandbox-attacksurface-analysis-tools
Set of tools to analyze Windows sandboxes for exposed attack surface.
last-byte/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
GoSecure/pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
illera88/Ponce
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
microsoft/win32-app-isolation
Tools and documentation for Win32 app isolation
vitoplantamura/BugChecker
SoftICE-like kernel debugger for Windows 11
hackerhouse-opensource/iscsicpl_bypassUAC
UAC bypass for x64 Windows 7 - 11
XaFF-XaFF/Black-Angel-Rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
zer0condition/ReverseKit
x64 Dynamic Reverse Engineering Toolkit
diversenok/TokenUniverse
An advanced tool for working with access tokens and Windows security policy.
Cybereason/siofra
zodiacon/EtwExplorer
View ETW Provider manifest
Xyrem/HyperDeceit
HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate operating system tasks with ease.
netero1010/ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
NUL0x4C/KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
Xyrem/Yumekage
Demo proof of concept for shadow regions, and implementation of HyperDeceit.
TimMisiak/WinDbgCookbook
This is a repo for small, useful scripts and extensions
WithSecureLabs/ppid-spoofing
Scripts for performing and detecting parent PID spoofing
hackerhouse-opensource/ColorDataProxyUACBypass
Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 & up.
3gstudent/ntfsDump
Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.
jdu2600/Etw-SyscallMonitor
Monitors ETW for security relevant syscalls maintaining the set called by each unique process
GonRappaport/GonDbg
thiyagab/sboss
A sample to freely host a telegram bot as cloud functions and integrated with firebase firestore
mbikovitsky/Sebastian
Safe Exam Browser VM check bypass
mbikovitsky/spi
Serial Process Interface