Pinned Repositories
BattleFN-cheat-analysis
CloakNDaggerC2
matt-culbert.github.io
OffSec
python
Random python projects, currently holding some school work
matt-culbert's Repositories
matt-culbert/CloakNDaggerC2
matt-culbert/OffSec
matt-culbert/matt-culbert.github.io
matt-culbert/bhg
Code samples for No Starch Press Black Hat Go
matt-culbert/cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
matt-culbert/DeffSec
matt-culbert/EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
matt-culbert/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
matt-culbert/evil-compiler
An evil compiler that adds undetectable backdoors into programs it compiles
matt-culbert/exploitation-course
Offensive Software Exploitation Course
matt-culbert/follina.py
Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes
matt-culbert/go-shellcode
A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
matt-culbert/GoC2
matt-culbert/koadic
zerosum0x0's Koadic
matt-culbert/laZzzy
laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
matt-culbert/memguard
Secure software enclave for storage of sensitive information in memory.
matt-culbert/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
matt-culbert/offsec-golang-utilities
matt-culbert/OSCP-Cheatsheet
OSCP Cheatsheet by Sai Sathvik
matt-culbert/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
matt-culbert/Periscope
matt-culbert/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
matt-culbert/suricata_rules
Rules for Suricata
matt-culbert/SwitchBladeV2
matt-culbert/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
matt-culbert/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
matt-culbert/w32
A wrapper of Windows APIs for Go
matt-culbert/Windows-universal-samples
API samples for the Universal Windows Platform.
matt-culbert/wintoken
Mainpulate, Steal and Modify Windows Tokens in Go
matt-culbert/WMIProcessWatcher
A CIA tradecraft technique to asynchronously detect when a process is created using WMI.