Pinned Repositories
bat-sh
cmd2shellcode
cmd2shellcode
foxmail_password_recovery
Added option to decrypt manually
KaynLdr
KaynLdr is a Reflective Loader written in C/ASM
LOIC
Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES.
metasploit-framework
Metasploit Framework
net_by_python
python网络编程练习作品
scareing.github.io
scareing的Blog
Self_defend
UAC_wenpon
UAC_wenpon
scareing's Repositories
scareing/cmd2shellcode
cmd2shellcode
scareing/UAC_wenpon
UAC_wenpon
scareing/foxmail_password_recovery
Added option to decrypt manually
scareing/scareing.github.io
scareing的Blog
scareing/KaynLdr
KaynLdr is a Reflective Loader written in C/ASM
scareing/Self_defend
scareing/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
scareing/ADVobfuscator
Obfuscation library based on C++11/14 and metaprogramming
scareing/Azure-Red-Team
Azure Security Resources and Notes
scareing/BOFs
Collection of Beacon Object Files
scareing/CheckSafeBoot
I used this to see if an EDR is running in Safe Mode
scareing/CobaltStrike
CobaltStrike's source code
scareing/DLLHijackTest
DLL and PowerShell script to assist with finding DLL hijacks
scareing/evtx2xlsx
Parsing user login logs from windows security.evtx
scareing/exploits
scareing/Havoc
The Havoc Framework
scareing/InlineExecute-Assembly
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
scareing/MagiskOnWSA
Integrate Magisk root and Google Apps (OpenGApps) into WSA (Windows Subsystem for Android)
scareing/mimikatz
A little tool to play with Windows security
scareing/nanodump
Dumping LSASS has never been so stealthy
scareing/NGLite
A major platform RAT Tool based by Blockchain/P2P.Now support Windows/Linux/MacOS
scareing/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
scareing/runas_demo
scareing/RunPE-In-Memory
Run a Exe File (PE Module) in memory (like an Application Loader)
scareing/Rust_Beacon
使用 rust 实现 CobaltStrike 的 beacon || Using Rust to implement CobaltStrike's Beacon
scareing/SinMapper
usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to map your driver over. the main focus of this project is to prevent modern anti-cheats (BattlEye, EAC) from finding your driver and having the power to hook anything due to being inside of legit memory (signed legit driver).
scareing/TelemetrySourcerer
Enumerate and disable common sources of telemetry used by AV/EDR.
scareing/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
scareing/WinAPI-Tricks
Collection of various WINAPI tricks / features used or abused by Malware
scareing/Windows_Installer_File_Read