naliferopoulos's Stars
joaoviictorti/RustRedOps
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
DosX-dev/obfus.h
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
fiddyschmitt/File-Tunnel
Tunnel TCP connections through a file
YuriiCrimson/ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
ricardojoserf/NativeDump
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
Ridter/atexec-pro
Fileless atexec, no more need for port 445
EgeBalci/deoptimizer
Evasion by machine code de-optimization.
klezVirus/DriverJack
Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths
trickster0/NamelessC2
Nameless C2 - A C2 with all its components written in Rust
hasherezade/thread_namecalling
Process Injection using Thread Name
trustedsec/The_Shelf
Retired TrustedSec Capabilities
WKL-Sec/LayeredSyscall
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
sotasan/decompiler
Java Decompiler GUI
naksyn/DojoLoader
Generic PE loader for fast prototyping evasion techniques
trustedsec/specula
susMdT/LoudSunRun
Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven
jsecurity101/ETWInspector
Cobalt-Strike/bof-vs
A Beacon Object File (BOF) template for Visual Studio
ZERODETECTION/MSC_Dropper
Octoberfest7/enumhandles_BOF
CENSUS/ghidra-frida-hook-gen
Frida hook generator for Ghidra
thiagopeixoto/winsos-poc
A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
jdu2600/EtwTi-FluctuationMonitor
Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections
xrombar/flower
a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
paskalian/WID_LoadLibrary
Reverse engineering winapi function loadlibrary.
SECFORCE/SharpASM
SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections allocated by the CLR.
BehroozAbbassi/DriverAnalyzer
A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers (CVE makers!)
vlinx-io/NativeImageAnalyzer
GraalVM NativeImage Decompilation/Reverse Tool
dzervas/magicentry
A smol identity provider
kr0tt/Norka
Executing shellcode in RWX code caves using thread pools.