Pinned Repositories
-APT-
APT
1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Active-Directory-Pentest-Notes
个人域渗透学习笔记
ADIDNSRecords
Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses
AgentSmith-HIDS
By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Alaris
A protective and Low Level Shellcode Loader the defeats modern EDR systems.
autochk-rootkit
Reverse engineered source code of the autochk rootkit
Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
RunOnceEx's Repositories
RunOnceEx/1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
RunOnceEx/AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
RunOnceEx/Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
RunOnceEx/Beacon
Open Source Cobalt Strike Beacon. Unreleased, in research stages.
RunOnceEx/bypass-av-note
免杀技术大杂烩---乱拳打死老师傅
RunOnceEx/COFFInjector
PoC MSVC COFF Object file loader/injector.
RunOnceEx/ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
RunOnceEx/DoppelGate
DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userland Hooking.
RunOnceEx/HookDump
Security product hook detection
RunOnceEx/inline_syscall
Inline syscalls made easy for windows on clang
RunOnceEx/kopycat
Linux Kernel module-less implant (backdoor)
RunOnceEx/link
link is a command and control framework written in rust
RunOnceEx/LsassSilentProcessExit
Command line interface to dump LSASS memory to disk via SilentProcessExit
RunOnceEx/memexec
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
RunOnceEx/memlib-rs
A cross platform memory hacking library written in Rust aimed at cheat development.
RunOnceEx/min-sized-rust
🦀 How to minimize Rust binary size 📦
RunOnceEx/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
RunOnceEx/pfsense
Main repository for pfSense
RunOnceEx/PIC-Get-Privileges
Building and Executing Position Independent Shellcode from Object Files in Memory
RunOnceEx/rootkit-arsenal-guacamole
An attempt to restore and adapt to modern Win10 version the Rootkit Arsenal original code sampls
RunOnceEx/rs-winapi2
Microsoft Windows user-mode API access with clean Rust types.
RunOnceEx/rust-windows-shellcode
Windows shellcode development in Rust
RunOnceEx/shieldwall
zero-trust remote firewall instrumentation
RunOnceEx/sn0int
Semi-automatic OSINT framework and package manager
RunOnceEx/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
RunOnceEx/unhook-bof
Remove API hooks from a Beacon process.
RunOnceEx/UnhookMe
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
RunOnceEx/weblogic_cmd_plus
weblogic full vulnerability exploit tool, support T3/XMLDecoder vulnerability scanning .
RunOnceEx/WhiteBeam
WhiteBeam: Transparent endpoint security
RunOnceEx/wsb-detect
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")