Stars
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
PowerSploit - A PowerShell Post-Exploitation Framework
Run PowerShell with rundll32. Bypass software restrictions.
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
COM ViewLogger — new malware keylogging technique
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.
Reverse engineering winapi function loadlibrary.
This repo contains some Amsi Bypass methods i found on different Blog Posts.
A tool that shows detailed information about named pipes in Windows
A lightweight YouTube client for Linux, without requiring an API key.
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Creates a proxy dll which sits between the game and original dll
Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.
Run a program as TrustedInstaller (SYSTEM)
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
A collection of tools, source code, and papers researching Windows' implementation of CET.
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.