whichbuffer's Stars
VirusTotal/yara
The pattern matching swiss knife
Yara-Rules/rules
Repository of yara rules
CyberMonitor/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
achillean/shodan-python
The official Python library for Shodan
optiv/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
0xnobody/vmpdump
A dynamic VMP dumper and import fixer, powered by VTIL.
signalapp/Signal-TLS-Proxy
kyleavery/AceLdr
Cobalt Strike UDRL for memory scanner evasion.
mgeeky/PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
reversinglabs/reversinglabs-yara-rules
ReversingLabs YARA Rules
mrexodia/dumpulator
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Idov31/Cronos
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
GhostPack/Koh
The Token Stealer
rad9800/TamperingSyscalls
Neo23x0/sysmon-config
Sysmon configuration file template with default high-quality event tracing
WithSecureLabs/CallStackSpoofer
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
R3MRUM/PSDecode
PowerShell script for deobfuscating encoded PowerShell scripts
kagurazakasanae/Mhyprot2DrvControl
A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.
memN0ps/venom-rs
Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)
Kudaes/DInvoke_rs
Dynamically invoke arbitrary unmanaged code
kkent030315/evil-mhyprot-cli
A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
NUL0x4C/KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
Kudaes/Dumpy
Reuse open handles to dynamically dump LSASS.
huntandhackett/concealed_code_execution
Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows
janoglezcampos/rust_syscalls
Single stub direct and indirect syscalling with runtime SSN resolving for windows.
mez-0/InMemoryNET
Exploring in-memory execution of .NET
sourceincite/DashOverride
This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager
crummie5/Freshycalls_PoC
A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯
c3rb3ru5d3d53c/signatures
Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma
CodeXTF2/evasion-adventures-files
Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"