geliuz's Stars
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
a0rtega/pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
ustayready/fireprox
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
samyk/slipstream
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Idov31/Nidhogg
Nidhogg is an all-in-one simple to use windows kernel rootkit.
netero1010/EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Mr-Un1k0d3r/DKMC
DKMC - Dont kill my cat - Malicious payload evasion tool
Xacone/BestEdrOfTheMarket
Little user-mode AV/EDR evasion lab for training & learning purposes
bluet/proxybroker2
The New (auto rotate) Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS :performing_arts:
Octoberfest7/Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
CICADA8-Research/RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
bohops/UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
BC-SECURITY/Moriarty
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
mdsecactivebreach/Chameleon
Chameleon: A tool for evading Proxy categorisation
Helixo32/CrimsonEDR
Simulate the behavior of AV/EDR for malware development training.
S3cur3Th1sSh1t/Caro-Kann
Encrypted shellcode Injection to avoid Kernel triggered memory scans
RedSiege/EDD
Enumerate Domain Data
hackerhouse-opensource/Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
Krook9d/PurpleLab
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks, all accessible through a user-friendly web interface
Maldev-Academy/Christmas
eeriedusk/nysm
nysm is a stealth post-exploitation container.
0xsp-SRD/MDE_Enum
comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges
rasta-mouse/CsWhispers
Source generator to add D/Invoke and indirect syscall methods to a C# project.
fin3ss3g0d/ASPJinjaObfuscator
Heavily obfuscated ASP web shell generation tool.
blackarrowsec/Handly
Abuse leaked token handles.
ZeroPointSecurity/PInvoke
uf0o/PykDumper
Dumping credentials through windbg and pykd
puzzlepeaches/NTLMRecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
snovvcrash/exfiltrate
exfiltration/infiltration toolkit