her0ness
My name is Devid, My core skill set involves emulating real-world cyber attacks through Adversary Simulation and Red Team exercises.
Italy
Pinned Repositories
av-edr-urls
AV/EDR companies netblocks
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
SCShell
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
Callback_Shellcode_Injection
POCs for Shellcode Injection via Callbacks
ditto
Binary resource copier
NativePayload_CBT
NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Obfuscate
Guaranteed compile-time string literal obfuscation header-only library for C++14
SharpMove
.NET Project for performing Authenticated Remote Execution
her0ness's Repositories
her0ness/Talks
her0ness/her0ness.github.io
✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com
her0ness/TokenStripBOF
Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process
her0ness/KerberOPSEC
OPSEC safe Kerberoasting in C#
her0ness/uncover
Quickly discover exposed hosts on the internet using multiple search engine.
her0ness/BofAllTheThings
Creating a repository with all public Beacon Object Files (BoFs)
her0ness/BofRoast
Beacon Object Files for roasting Active Directory
her0ness/MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
her0ness/BackupOperatorToDA
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
her0ness/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
her0ness/Obfuscate
Guaranteed compile-time string literal obfuscation header-only library for C++14
her0ness/SuperSneakyExec
Loading and executing shellcode in C# without PInvoke.
her0ness/encrypt
Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.
her0ness/inject-assembly
Inject .NET assemblies into an existing process
her0ness/Mind-Maps
Mind-Maps of Several Things
her0ness/uuid-loader
UUID based Shellcode loader for your favorite C2
her0ness/FindObjects-BOF
A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles.
her0ness/port-forwarding
Tunneling and Port Forwarding Cheat Sheet
her0ness/av-edr-urls
AV/EDR companies netblocks
her0ness/Ninja_UUID_Dropper
Module Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!
her0ness/Needle_Sift_BOF
Strstr with user-supplied needle and filename as a BOF.
her0ness/SourcePoint
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
her0ness/secinject
Section Mapping Process Injection (secinject): Cobalt Strike BOF
her0ness/LiquidSnake
LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
her0ness/CobaltStrikeReflectiveLoader
Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
her0ness/whereami
Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.
her0ness/blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
her0ness/injectAmsiBypass
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
her0ness/SystemNightmare
Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows
her0ness/hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).