TheWover's Stars
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
byt3bl33d3r/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
ComodoSecurity/openedr
Open EDR public repository
gtworek/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
phra/PEzor
Open-Source Shellcode & PE Packer
knownsec/shellcodeloader
shellcodeloader
mubix/post-exploitation
Post Exploitation Collection
adishavit/argh
Argh! A minimalist argument handler.
jxy-s/herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
DeimosC2/DeimosC2
DeimosC2 is a Golang command and control framework for post-exploitation.
d35ha/CallObfuscator
Obfuscate specific windows apis with different apis
cxong/tinydir
Lightweight, portable and easy to integrate C directory and file reader
jthuraisamy/TelemetrySourcerer
Enumerate and disable common sources of telemetry used by AV/EDR.
awaescher/Fusion
🧰 A modern alternative to the Microsoft Assembly Binding Log Viewer (FUSLOGVW.exe)
btbd/smap
DLL scatter manual mapper
FuzzySecurity/StandIn
StandIn is a small .NET35/45 AD post-exploitation toolkit
CCob/BOF.NET
A .NET Runtime for Cobalt Strike's Beacon Object Files
cube0x0/SharpMapExec
br-sn/CheekyBlinder
Enumerating and removing kernel callbacks using signed vulnerable drivers
MythicAgents/Apollo
A .NET Framework 4.0 Windows Agent
LloydLabs/wsb-detect
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")
XiphosResearch/netelf
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
mandiant/OfficePurge
SpecterOps/presentations
SpecterOps Presentations
rprichard/win32-console-docs
Win32 Console Documentation -- in particular, console/standard handles and CreateProcess inheritance
EgeBalci/IAT_API
Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
jordanbtucker/dpapick
DPAPI offline decryption utility
GrayKernel/GrayStorm
In memory attack platform for C# Applications
zodiacon/NativeApps
Demos and presentation from SECArmy Village Grayhat 2020
lallouslab/Ganxo_
An opensource API hooking framework