janoglezcampos's Stars
HavocFramework/Havoc
The Havoc Framework
miroslavpejic85/p2p
🖥️ P2P Remote Desktop - Portable, No Configuration or Installation Needed.
monoxgas/sRDI
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
DidierStevens/DidierStevensSuite
Please no pull requests for this repository. Thanks!
Idov31/Nidhogg
Nidhogg is an all-in-one simple to use windows kernel rootkit.
outflanknl/C2-Tool-Collection
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
icyguider/Shhhloader
Syscall Shellcode Loader (Work in Progress)
elastic/protections-artifacts
Elastic Security detection content for Endpoint
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
kyleavery/AceLdr
Cobalt Strike UDRL for memory scanner evasion.
daem0nc0re/PrivFu
Kernel mode WinDbg extension and PoCs for token privilege investigation.
Cr4sh/s6_pcie_microblaze
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
TheWover/DInvoke
Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
praetorian-inc/PortBender
TCP Port Redirection Utility
Idov31/Cronos
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
stp/stp
Simple Theorem Prover, an efficient SMT solver for bitvectors
nettitude/SharpWSUS
Dec0ne/DllNotificationInjection
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
vxlang/vxlang-page
protector & obfuscator & code virtualizer
armvirus/SinMapper
usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to map your driver over. the main focus of this project is to prevent modern anti-cheats (BattlEye, EAC) from finding your driver and having the power to hook anything due to being inside of legit memory (signed legit driver).
marcan/speculation-bugs
Docs and resources on CPU Speculative Execution bugs
Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
CodeXTF2/maldev-links
My collection of malware dev links
MzHmO/NtlmThief
Extracting NetNTLM without touching lsass.exe
ORCA666/Hacking-P-B
the only place u can acquire knowledge
BlackOfWorld/NtCreateUserProcess
A small NtCreateUserProcess PoC that spawns a Command prompt.
moloch--/reasonably-secure-electron
A pattern for reasonably secure Electron applications
soatok/constant-time-js
Constant-time JavaScript functions
peterwintersmith/crystalaep
Crystal Anti-Exploit Protection 2012
aaaddress1/Win-Exploit-Inject
PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts