Lists (32)
Sort Name ascending (A-Z)
Android
安卓逆向BlueTeam/Digital Forensic
应急响应、数字取证Bypass UAC/AMSI
BypassEDR/AVs
免杀,C、C++、C#、Power shell等C#/C++/C/Java/go
各种语言方面的知识C2/RAT
远控、C2等Cloud/Docker/K8s
云安全/容器安全等Defender
蓝队,防守DLL/Process Hijacking
劫持,DLL劫持Domain/Internet
域相关,内网Drivers
Windows/Linux驱动开发Elevation of Privileges
Win/Linux 提权技术Hook/Unhook
Hunter
恶意软件检测/防护/识别Injection
进程注入、DLL注入、Shellcode注入等InterestingSomeThing
IOT/Wifi/Industrial
物联网/WIFI/工控等硬件安全Lateral Movement
Linux
Malware
病毒,程序开发NetWork
网络Obfuscation/Encrypt/Decrypt
混淆,加密,编码Packer/Shell
壳、加密器Persistence
权限维持Phishing
Proxy
RedTeam
ReadTeam/PenstestReverse
逆向rootkits
ShellCode/Loader
Stealer/keylogger/sniffer
窃密器/键盘记录等Windows/R3/R0
Windows开发,内核Starred repositories
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
A collection of position independent coding resources
IoM implant, C2 Framework and Infrastructure
Cobalt Strike Malleable C2 Design and Reference Guide
Port of Cobalt Strike's Process Inject Kit
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)
Run docker & LXC images without docker or LXC program, without kernel features support, even without root privileges!
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protections.
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
This project contains an open source RAT (Remote Access Trojan).
A BOF to enumerate system process, their protection levels, and more.
A collaborative, multi-platform, red teaming framework
Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
64-bit, position-independent implant template for Windows in Rust.
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
Tools for instrumenting Windows Defender's mpengine.dll
Extracted Yara rules from Windows Defender mpavbase and mpasbase
This is Growtopia stealer save.dat file, Discord Webhook sends a file, mac address, IP info, city, and more...
Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...