Pinned Repositories
BlockOpenHandle
Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote memory scanners
D1rkLdr
Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscall instruction address resolving at run time
FilelessPELoader
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
HeapCrypt
Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap
ntdlll-unhooking-collection
different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)
NTDLLReflection
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
PE-Obfuscator
PE obfuscator with Evasion in mind
Shellcode-Hide
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
TakeMyRDP
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
UnhookingPatch
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
TheD1rkMtr's Repositories
TheD1rkMtr/FilelessPELoader
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
TheD1rkMtr/TakeMyRDP
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
TheD1rkMtr/Shellcode-Hide
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
TheD1rkMtr/NTDLLReflection
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
TheD1rkMtr/D1rkLdr
Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscall instruction address resolving at run time
TheD1rkMtr/UnhookingPatch
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
TheD1rkMtr/HeapCrypt
Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap
TheD1rkMtr/PE-Obfuscator
PE obfuscator with Evasion in mind
TheD1rkMtr/ntdlll-unhooking-collection
different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)
TheD1rkMtr/BlockOpenHandle
Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote memory scanners
TheD1rkMtr/D1rkInject
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
TheD1rkMtr/StackCrypt
Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume threads
TheD1rkMtr/DocPlz
Documents Exfiltration project for fun and educational purposes
TheD1rkMtr/AMSI_patch
Patching AmsiOpenSession by forcing an error branching
TheD1rkMtr/GithubC2
Github as C2 Demonstration , free API = free C2 Infrastructure
TheD1rkMtr/D1rkSleep
Improved version of EKKO by @5pider that Encrypts only Image Sections
TheD1rkMtr/PSpersist
Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell process is created, the implant will be executed too.
TheD1rkMtr/VT-stealer
VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server
TheD1rkMtr/BlockNonMSModules
Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules
TheD1rkMtr/HadesLdr
Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2
TheD1rkMtr/APTs_clone
This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.
TheD1rkMtr/TheD1rkMtr
TheD1rkMtr/SweetDreams
Implementation of Advanced Module Stomping and Heap/Stack Encryption
TheD1rkMtr/ocd-mindmaps
Orange Cyberdefense mindmaps
TheD1rkMtr/Reflective-Driver-Loader
TheD1rkMtr/d1rkmtr.github.io