whichbuffer's Stars
hfiref0x/UACME
Defeating Windows User Account Control
mitre/caldera
Automated Adversary Emulation Platform
Azure/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
swimlane/ngx-charts
:bar_chart: Declarative Charting Framework for Angular
nicocha30/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
mgeeky/Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
sysdream/ligolo
Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
kimci86/bkcrack
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
WithSecureLabs/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Lozy/danted
Fast script for installing & configing Danted--Socks5 Proxy Server.
klezVirus/SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
0x09AL/RdpThief
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
samratashok/ADModule
Microsoft signed ActiveDirectory PowerShell module
hatRiot/token-priv
Token Privilege Research
RedTeamOperations/Advanced-Process-Injection-Workshop
swimlane/ngx-ui
🚀 Style and Component Library for Angular
JPCERTCC/MalConfScan
Volatility plugin for extracts configuration data of known malware
KaLendsi/CVE-2022-21882
win32k LPE
hasherezade/process_overwriting
Yet another variant of Process Hollowing
captainGeech42/ransomwatch
Ransomware leak site monitoring
S3cur3Th1sSh1t/Nim-RunPE
A Nim implementation of reflective PE-Loading from memory
cdong1012/Rust-Ransomware
Ransomware written in Rust
Orange-Cyberdefense/russia-ukraine_IOCs
Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake
embee-research/Randomise-api-hashes-cobalt-strike
Bypass Detection By Randomising ROR13 API Hashes
Res260/conti_202202_leak_procedures
This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in the leak and posted on may 10th, 2021 in the channel.
riskydissonance/SyscallsExample
Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.
tothi/SharpStay
.NET project for installing Persistence
iammaguire/Salient-Rootkit
A kernel mode Windows rootkit in development.
tothi/PowerLessShell
Run PowerShell command without invoking powershell.exe
whichbuffer/Conti-Ransomware-IOC