ZkClown's Stars
dockur/windows
Windows inside a Docker container.
blacklanternsecurity/bbot
The recursive internet scanner for hackers. š§”
BLAKE3-team/BLAKE3
the official Rust and C implementations of the BLAKE3 cryptographic hash function
Neo23x0/Loki
Loki - Simple IOC and YARA Scanner
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
GhostManager/Ghostwriter
The SpecterOps project management and reporting engine
swisskyrepo/InternalAllTheThings
Active Directory and Internal Pentest Cheatsheets
bats3c/DarkLoadLibrary
LoadLibrary for offensive operations
login-securite/DonPAPI
Dumping DPAPI credz remotely
SafeBreach-Labs/PoolParty
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
mbrg/power-pwn
An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform
0xZDH/o365spray
Username enumeration and password spraying tool aimed at Microsoft O365.
p3nt4/Invoke-SocksProxy
Socks proxy, and reverse socks server using powershell.
pwn1sher/KillDefender
A small POC to make defender useless by removing its token privileges and lowering the token integrity
hasherezade/process_doppelganging
My implementation of enSilo's Process Doppelganging (PE injection technique)
fortra/No-Consolation
A BOF that runs unmanaged PEs inline
RedByte1337/GraphSpy
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
vxCrypt0r/Voidgate
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page.
0xEr3bus/PoolPartyBof
A beacon object file implementation of PoolParty Process Injection Technique.
S3cur3Th1sSh1t/Caro-Kann
Encrypted shellcode Injection to avoid Kernel triggered memory scans
Prepouce/CoercedPotato
A Windows potato to privesc
Kudaes/Shelter
ROP-based sleep obfuscation to evade memory scanners
D4stiny/ForkPlayground
An implementation and proof-of-concept of Process Forking.
EvanMcBroom/perfect-loader
Load a dynamic library from memory by modifying the native Windows loader
mandiant/ccmpwn
OtterHacker/SetProcessInjection
realoriginal/grimreaper
A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls
fkie-cad/yapscan
Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.
MythicAgents/leviathan