Stars
BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)
Reaping treasures from strings in remote processes memory
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
An easy-to-use and powerful Macro for Stack Spoofing.
Magical obfuscator, supports obfuscating EXE, BOF, and ShellCode.
COM ViewLogger — new malware keylogging technique
Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Make everyone in your VLAN ASRep roastable
powershell prompt as a rainmeter skin
A customizable terminal to integrate with your desktop background on Windows.
The next open source file uploader for web browsers 🐶
Manual mapping without creating any threads, with rw only access
coffeegist / bofhound
Forked from fortalice/bofhoundGenerate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
AV/EDR Lab environment setup references to help in Malware development
The easiest way to run WireGuard VPN + Web-based Admin UI.
Check for LDAP protections regarding the relay of NTLM authentication
A collection of companies that disclose adversary TTPs after they have been breached
A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small files or massive datasets, this tool handles the heavy lifting w…
StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and behaviour detection of executed actions against defined def…
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Extracted Yara rules from Windows Defender mpavbase and mpasbase