cwinfosec's Stars
fortalice/bofhound
Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
lief-project/LIEF
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
bfilar/malware_rl
Malware Bypass Research using Reinforcement Learning
netero1010/ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
AonCyberLabs/Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
seahop/patchETW
Function to patch ETW with syscalls
bohops/SharpRDPHijack
A proof-of-concept Remote Desktop (RDP) session hijack utility
Tib3rius/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
aafulei/color-console
A lightweight header-only C++ library to bring colors to your Windows console with a very-easy-to-use API.
3gstudent/Homework-of-C-Language
C/C++ code examples of my blog.
PortSwigger/wordpress-scanner
Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.
uf0o/windows-ps-callbacks-experiments
Files for http://blog.deniable.org/posts/windows-callbacks/
mgeeky/ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
MythicAgents/Athena
whydee86/SnD_AMSI
Start new PowerShell without etw and amsi in pure nim
Mr-Un1k0d3r/EDRs
xx0hcd/CobaltStrike-Auto-Keystore
Automate Cobalt Strike keystore file for Teamserver SSL.
dosxuz/DefenderStop
Stop Defender Service using C# via Token Impersonation
trustedsec/SeeYouCM-Thief
TsudaKageyu/minhook
The Minimalistic x86/x64 API Hooking Library for Windows
jfmaes/AmsiHooker
Hookers are cooler than patches.
Truneski/WindowsKernelProgramming-Exercises
mvelazc0/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27 Workshop
The-XSS-Rat/SecurityTesting
leostat/rtfm
A database of common, interesting or useful commands, in one handy referable form
Cobalt-Strike/sleep_python_bridge
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. NOTE: This project is very much in BETA. The goal is to provide a playground for testing and is in no way an officially support feature. Perhaps this could be something added in the future to the core product.
aHaquer/writeups
Yes.
boku7/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
boku7/BokuLoader
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Marshall-Hallenbeck/red_team_attack_lab
Red Team Attack Lab for TTP testing & research