CTF-type challenge, exploring various exploitation methods
-
Updated
May 13, 2024 - C
CTF-type challenge, exploring various exploitation methods
A shellcode runner using the XOR cipher and NT API calls for evasion and execution tactics.
Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
A standard c-code library (`aptlib.h`) for Windows exploit & malware development.
Colección de herramientas y scripts enfocados al Red-Team y CTFs
Stack Spoofing PoC
PrivEsc using Process Token Impersonation - Search all Processes
This repository contains the source code of a simple Beacon Object File (BOF) for Cobalt Strike that I wrote during my learning process. It allows an operator to list the modules loaded in memory for a specified process on a Windows system.
Load shellcode into a new process, optionally under a false name.
A interactive remote shell launched from kernelspace. Works by hooking the e1000 driver.
Collection of personal Beacon Object Files (BOFs)
Beacon Object File PoC implementation of KillDefender
🐧 I Love Linux (ILL) is a C tool developed to fast search for kernel vulnerabilities and suggest to the user
Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.
Closes handles of a remote process in attempt to crash it
NTAPI hook bypass with (semi) legit stack trace
Indirect Syscall invocation via thread hijacking
Add a description, image, and links to the redteam topic page so that developers can more easily learn about it.
To associate your repository with the redteam topic, visit your repo's landing page and select "manage topics."