Pinned Repositories
CReadMemory
Read Memory without ReadProcessMemory for Current Process
EDR_Detector
EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.
Enyx
Enyx SNMP IPv6 Enumeration Tool
LdrLoadDll-Unhooking
LdrLoadDll Unhooking
Lenum
Linux Enumeration / Privilege escalation tool
NamelessC2
Nameless C2 - A C2 with all its components written in Rust
OffensiveRust
Rust Weaponization for Red Team Engagements.
RedLizard
RedLizard Rust TCP Reverse Shell Server/Client
TartarusGate
TartarusGate, Bypassing EDRs
UDPlant
UDP implant
trickster0's Repositories
trickster0/TartarusGate
TartarusGate, Bypassing EDRs
trickster0/LdrLoadDll-Unhooking
LdrLoadDll Unhooking
trickster0/EDR_Detector
EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.
trickster0/CReadMemory
Read Memory without ReadProcessMemory for Current Process
trickster0/UDPlant
UDP implant
trickster0/Lenum
Linux Enumeration / Privilege escalation tool
trickster0/Elastic_Panel_AutoInstall
Spawn Up quickly Elastic EDR Panel
trickster0/BlindBrowse
Android BlindBrowser : Real Time Navigation on Android devices with no display.
trickster0/bootdoor
Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE
trickster0/Lastenzug
Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level
trickster0/MicrosoftWontFixList
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
trickster0/Ox-C2
Command & Control server and agent written in Rust
trickster0/PPID-Spoofing
POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritting ntdll:LdrInitializeThunk with shellcode.
trickster0/AlanFramework
A C2 post-exploitation framework
trickster0/ANGRYORCHARD
A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.
trickster0/CollaRE
Multi-tool reverse engineering collaboration solution.
trickster0/CollaREServer
trickster0/com-research
Research into COM
trickster0/DarkPulsar
EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!
trickster0/DetectWindowsCopyOnWriteForAPI
Enumerate various traits from Windows processes as an aid to threat hunting
trickster0/kvass
内网穿透工具,实现了 frp 的部分功能
trickster0/Microsoft-Defender-for-Identity-Encrypted-Password
trickster0/misc
miscellaneous scripts and programs
trickster0/netntlm
A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP
trickster0/Nuages
A modular C2 framework
trickster0/proxy-for-dummies
trickster0/SassyKitdi
trickster0/SilentMoonwalk
PoC Implementation of a TRUE call stack spoofer
trickster0/trickster0.github.io
A minimal, sidebar, responsive web design Jekyll theme that focuses on text presentation.
trickster0/wsp
socks5 and reverse proxy based on websocket