seahop
Red Teamer. Just out here creating some simple PoCs for red teamy things. Amateur coder. No best practices here.
United States
seahop's Stars
0xTriboulet/Revenant
Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework
Octoberfest7/Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
rad9800/misc
miscellaneous scripts and programs
yardenshafir/WinDbg_Scripts
Useful scripts for WinDbg using the debugger data model
kbsec/malware-course-public
Mr-Un1k0d3r/AMSI-ETW-Patch
Patch AMSI and ETW
seahop/NoRunPI
Run Your Payload Without Running Your Payload
MaorSabag/SideLoadingDLL
Do some DLL SideLoading magic
smokeme/airstrike
HavocFramework/Talon
(Demo) 3rd party agent for Havoc
NUL0x4C/KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
antonioCoco/JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
Sh0ckFR/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
HyperSine/Windows10-CustomKernelSigners
Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSigners
BishopFox/cloudfox
Automating situational awareness for cloud penetration tests.
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
hashcat/kwprocessor
Advanced keyboard-walk generator with configureable basechars, keymap and routes
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
mytechnotalent/Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
seahop/SyscallProcScan
Syscall process scanner
seahop/Injection
seahop/RemoteProcDLLInject
seahop/CPP_XOR
seahop/RemoteShellcodeInjection_XOR
seahop/getPIDIntegrity
seahop/pyXOR_Bin